4.9
CVE-2023-5616
- EPSS 0.03%
- Published 15.04.2025 18:29:54
- Last modified 26.08.2025 16:34:27
- Source security@ubuntu.com
- Teams watchlist Login
- Open Login
In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user.
Data is provided by the National Vulnerability Database (NVD)
Gnome ≫ Control Center Version >= 1.3 < 1.3.36.5-0ubuntu4.1
Gnome ≫ Control Center Version >= 1.41 < 1.41.7-0ubuntu0.22.04.8
Gnome ≫ Control Center Version >= 1.44 < 1.44.0-1ubuntu6.1
Gnome ≫ Control Center Version >= 1.45 < 1.45.0-1ubuntu3.1
Canonical ≫ Ubuntu Linux Version20.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version22.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version23.04
Canonical ≫ Ubuntu Linux Version23.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.062 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.9 | 1.4 | 3.4 |
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
|
CWE-290 Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.