24h | 7d | 30d

Overview

  • Pending

31 Jan 2019
Published
18 Dec 2025
Updated

CVSS
Pending
EPSS
41.22%

KEV

Description

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture

@hanno this question came up in the SSH world, relating to terminal SCP clients: sintonen.fi/advisories/scp-cli

An SCP client had some missing validation checks in download mode, allowing a malicious server to modify parts of the client's filesystem other than the ones the user authorised it to. As a side effect, the client printed diagnostics which would have given the game away – but the client was also happy to print unsanitised escape sequences sent by the SSH server, which allowed the malicious server to send a well chosen combination of 'move up, clear line of text' escapes to wipe those telltale diagnostics off the screen and allow the attack to go undetected.

In that context, the failure to sanitise escape sequences was assigned a CVE number. (In fact, two: CVE-2019-6109 and CVE-2019-6110.) But that was only because in that particular context it allowed the attacker to hide evidence of a more serious crime.

PuTTY's SCP client was not vulnerable to the 'missing validation check' issue, and didn't allow the server to make unauthorised modifications. It _did_ have the 'failure to sanitise escape sequences' issue, but we didn't regard this as a vulnerability when it _wasn't_ allowing the covering-up of a real attack, and the original researcher agreed.

(We did regard it as a _bug_, and we fixed it. But not, by itself, a vulnerability.)

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Pending

31 Jan 2019
Published
04 Aug 2024
Updated

CVSS
Pending
EPSS
16.14%

KEV

Description

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture

@hanno this question came up in the SSH world, relating to terminal SCP clients: sintonen.fi/advisories/scp-cli

An SCP client had some missing validation checks in download mode, allowing a malicious server to modify parts of the client's filesystem other than the ones the user authorised it to. As a side effect, the client printed diagnostics which would have given the game away – but the client was also happy to print unsanitised escape sequences sent by the SSH server, which allowed the malicious server to send a well chosen combination of 'move up, clear line of text' escapes to wipe those telltale diagnostics off the screen and allow the attack to go undetected.

In that context, the failure to sanitise escape sequences was assigned a CVE number. (In fact, two: CVE-2019-6109 and CVE-2019-6110.) But that was only because in that particular context it allowed the attacker to hide evidence of a more serious crime.

PuTTY's SCP client was not vulnerable to the 'missing validation check' issue, and didn't allow the server to make unauthorised modifications. It _did_ have the 'failure to sanitise escape sequences' issue, but we didn't regard this as a vulnerability when it _wasn't_ allowing the covering-up of a real attack, and the original researcher agreed.

(We did regard it as a _bug_, and we fixed it. But not, by itself, a vulnerability.)

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Airoha Technology Corp.
  • AB156x, AB157x, AB158x, AB159x series, AB1627

04 Aug 2025
Published
05 Aug 2025
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

In the Airoha Bluetooth audio SDK, there is a possible unauthorized access to the RACE protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture
💡 Summary: 研究者のディナス・ハインゼとフリーデル・スタインメッツは、多くの人気ヘッドホンやイヤホンに搭載されているAirohaのBluetoothオーディオチップにおいて、3つの重大な脆弱性(CVE-2025-20700、CVE-2025-20701、CVE-2025-20702)を発見しました。これらの欠陥により、デバイスの完全な乗っ取りが可能となり、攻撃者は周辺機器を操作したりなりすましたりできるため、接続されたスマートフォンに対しても脅威となる可能性があります。プレゼンテーションでは、これらのセキュリティリスクを強調し、ソニー、ジャブラ、 (1/2)
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Airoha Technology Corp.
  • AB156x, AB157x, AB158x, AB159x series

04 Aug 2025
Published
05 Aug 2025
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

In the Airoha Bluetooth audio SDK, there is a possible way to pair Bluetooth audio device without user consent. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture
💡 Summary: 研究者のディナス・ハインゼとフリーデル・スタインメッツは、多くの人気ヘッドホンやイヤホンに搭載されているAirohaのBluetoothオーディオチップにおいて、3つの重大な脆弱性(CVE-2025-20700、CVE-2025-20701、CVE-2025-20702)を発見しました。これらの欠陥により、デバイスの完全な乗っ取りが可能となり、攻撃者は周辺機器を操作したりなりすましたりできるため、接続されたスマートフォンに対しても脅威となる可能性があります。プレゼンテーションでは、これらのセキュリティリスクを強調し、ソニー、ジャブラ、 (1/2)
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Airoha Technology Corp.
  • AB156x, AB157x, AB158x, AB159x series, AB1627

04 Aug 2025
Published
05 Aug 2025
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

In the Airoha Bluetooth audio SDK, there is a possible permission bypass that allows access critical data of RACE protocol through Bluetooth LE GATT service. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture
💡 Summary: 研究者のディナス・ハインゼとフリーデル・スタインメッツは、多くの人気ヘッドホンやイヤホンに搭載されているAirohaのBluetoothオーディオチップにおいて、3つの重大な脆弱性(CVE-2025-20700、CVE-2025-20701、CVE-2025-20702)を発見しました。これらの欠陥により、デバイスの完全な乗っ取りが可能となり、攻撃者は周辺機器を操作したりなりすましたりできるため、接続されたスマートフォンに対しても脅威となる可能性があります。プレゼンテーションでは、これらのセキュリティリスクを強調し、ソニー、ジャブラ、 (1/2)
  • 0
  • 0
  • 0
  • 15h ago
Showing 21 to 25 of 25 CVEs