CVE-2023-51767

Published: Dic 24, 2023 Last Modified: Nov 18, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,0
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states 'we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.'

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0001
Percentile
0,0th
Updated

EPSS Score Trend (Last 90 Days)

Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Openssh by Openbsd

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://access.redhat.com/security/cve/CVE-2023-51767
https://arxiv.org/abs/2309.02545
https://bugzilla.redhat.com/show_bug.cgi?id=2255850
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076f…
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076f…
https://security.netapp.com/advisory/ntap-20240125-0006/
https://ubuntu.com/security/CVE-2023-51767
http://www.openwall.com/lists/oss-security/2025/09/22/1
http://www.openwall.com/lists/oss-security/2025/09/22/2
http://www.openwall.com/lists/oss-security/2025/09/23/1
http://www.openwall.com/lists/oss-security/2025/09/23/3
http://www.openwall.com/lists/oss-security/2025/09/23/4
http://www.openwall.com/lists/oss-security/2025/09/23/5
http://www.openwall.com/lists/oss-security/2025/09/24/4
http://www.openwall.com/lists/oss-security/2025/09/24/7
http://www.openwall.com/lists/oss-security/2025/09/25/2
http://www.openwall.com/lists/oss-security/2025/09/25/6
http://www.openwall.com/lists/oss-security/2025/09/26/2
http://www.openwall.com/lists/oss-security/2025/09/26/4
http://www.openwall.com/lists/oss-security/2025/09/27/1
http://www.openwall.com/lists/oss-security/2025/09/27/2
http://www.openwall.com/lists/oss-security/2025/09/27/3
http://www.openwall.com/lists/oss-security/2025/09/27/4
http://www.openwall.com/lists/oss-security/2025/09/27/5
http://www.openwall.com/lists/oss-security/2025/09/27/6
http://www.openwall.com/lists/oss-security/2025/09/27/7
http://www.openwall.com/lists/oss-security/2025/09/28/7
http://www.openwall.com/lists/oss-security/2025/09/29/1
http://www.openwall.com/lists/oss-security/2025/09/29/4
http://www.openwall.com/lists/oss-security/2025/09/29/5
http://www.openwall.com/lists/oss-security/2025/09/29/6
http://www.openwall.com/lists/oss-security/2025/10/01/1
http://www.openwall.com/lists/oss-security/2025/10/01/2
https://access.redhat.com/security/cve/CVE-2023-51767
https://arxiv.org/abs/2309.02545
https://bugzilla.redhat.com/show_bug.cgi?id=2255850
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076f…
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076f…
https://security.netapp.com/advisory/ntap-20240125-0006/
https://ubuntu.com/security/CVE-2023-51767
https://www.openwall.com/lists/oss-security/2025/09/22/1