Vulnerability Details CVE-2018-15599
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 66.1%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2018-15599
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.28
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.29
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.30
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.31
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.32
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.33
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.34
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.35
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.36
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.37
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.38
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.39
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.40
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.41
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.42
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.43
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.44
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.45
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.46
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.47
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.48
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.48.1
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.49
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.50
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.51
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.52
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.53
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:0.53.1
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2011.54
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2012.54
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2012.55
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.56
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.57
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.58
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.59
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.60
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.61
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2013.62
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2014.63
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2014.64
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2014.65
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2014.66
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.67
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.68
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.69
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.70
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2015.71
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2016.72
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2016.73
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2016.74
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2017.75
-
cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:2018.76
-
cpe:2.3:o:debian:debian_linux:8.0