CVE-2023-51767
HIGH
7,0
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states 'we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.'
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0001
Percentile
0,0th
Updated
EPSS Score Trend (Last 90 Days)
Operating System
Enterprise Linux by Redhat
CPE Identifier
View Detailed Analysis
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Fedora by Fedoraproject
CPE Identifier
View Detailed Analysis
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Openssh by Openbsd
CPE Identifier
View Detailed Analysis
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Enterprise Linux by Redhat
CPE Identifier
View Detailed Analysis
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://access.redhat.com/security/cve/CVE-2023-51767
https://arxiv.org/abs/2309.02545
https://bugzilla.redhat.com/show_bug.cgi?id=2255850
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076f…
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076f…
https://security.netapp.com/advisory/ntap-20240125-0006/
https://ubuntu.com/security/CVE-2023-51767
http://www.openwall.com/lists/oss-security/2025/09/22/1
http://www.openwall.com/lists/oss-security/2025/09/22/2
http://www.openwall.com/lists/oss-security/2025/09/23/1
http://www.openwall.com/lists/oss-security/2025/09/23/3
http://www.openwall.com/lists/oss-security/2025/09/23/4
http://www.openwall.com/lists/oss-security/2025/09/23/5
http://www.openwall.com/lists/oss-security/2025/09/24/4
http://www.openwall.com/lists/oss-security/2025/09/24/7
http://www.openwall.com/lists/oss-security/2025/09/25/2
http://www.openwall.com/lists/oss-security/2025/09/25/6
http://www.openwall.com/lists/oss-security/2025/09/26/2
http://www.openwall.com/lists/oss-security/2025/09/26/4
http://www.openwall.com/lists/oss-security/2025/09/27/1
http://www.openwall.com/lists/oss-security/2025/09/27/2
http://www.openwall.com/lists/oss-security/2025/09/27/3
http://www.openwall.com/lists/oss-security/2025/09/27/4
http://www.openwall.com/lists/oss-security/2025/09/27/5
http://www.openwall.com/lists/oss-security/2025/09/27/6
http://www.openwall.com/lists/oss-security/2025/09/27/7
http://www.openwall.com/lists/oss-security/2025/09/28/7
http://www.openwall.com/lists/oss-security/2025/09/29/1
http://www.openwall.com/lists/oss-security/2025/09/29/4
http://www.openwall.com/lists/oss-security/2025/09/29/5
http://www.openwall.com/lists/oss-security/2025/09/29/6
http://www.openwall.com/lists/oss-security/2025/10/01/1
http://www.openwall.com/lists/oss-security/2025/10/01/2
https://access.redhat.com/security/cve/CVE-2023-51767
https://arxiv.org/abs/2309.02545
https://bugzilla.redhat.com/show_bug.cgi?id=2255850
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076f…
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076f…
https://security.netapp.com/advisory/ntap-20240125-0006/
https://ubuntu.com/security/CVE-2023-51767
https://www.openwall.com/lists/oss-security/2025/09/22/1