4.9

CVE-2023-5616

Exploit

In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user.

Data is provided by the National Vulnerability Database (NVD)
GnomeControl Center Version >= 1.3 < 1.3.36.5-0ubuntu4.1
GnomeControl Center Version >= 1.41 < 1.41.7-0ubuntu0.22.04.8
GnomeControl Center Version >= 1.44 < 1.44.0-1ubuntu6.1
GnomeControl Center Version >= 1.45 < 1.45.0-1ubuntu3.1
CanonicalUbuntu Linux Version20.04 SwEditionlts
CanonicalUbuntu Linux Version22.04 SwEditionlts
CanonicalUbuntu Linux Version23.04
CanonicalUbuntu Linux Version23.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.062
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
134c704f-9b21-4f2e-91b3-4a467353bcc0 4.9 1.4 3.4
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE-290 Authentication Bypass by Spoofing

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.