CVE-2022-38337

When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mobatek:mobaxterm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:16

Type Values Removed Values Added
References () https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38337.html - Third Party Advisory () https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38337.html - Third Party Advisory
References () https://mobaxterm.mobatek.net/download-home-edition.html - Patch, Release Notes, Vendor Advisory () https://mobaxterm.mobatek.net/download-home-edition.html - Patch, Release Notes, Vendor Advisory

Information

Published : 2022-12-06 00:15

Updated : 2024-11-21 07:16


NVD link : CVE-2022-38337

Mitre link : CVE-2022-38337

CVE.ORG link : CVE-2022-38337


JSON object : View

Products Affected

mobatek

  • mobaxterm
CWE
CWE-798

Use of Hard-coded Credentials