Ask the Community
Groups
CVE-2018-10933 libssh: Authentication Bypass due to improper message callbacks implementation - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="summary"><strong>SUMMARY</strong></h3> <p>not vulnerable</p> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2018-10933</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>A vulnerability was found in libssh's server-side state machine. A malicious client could create channels without first performing authentication, resulting in unauthorized access.<br><br>CVSS3 Base Score 9.1<br><br><br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Unitrends systems are not vulnerable since libssh is not installed. Our software uses openssh and libssh2.</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2018-10933%250D%250Ahttps%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2018-10933">https://access.redhat.com/security/cve/cve-2018-10933 https://nvd.nist.gov/vuln/detail/CVE-2018-10933</a></li></ul> </article> </main>