When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.
References
Link | Resource |
---|---|
https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38337.html | Third Party Advisory |
https://mobaxterm.mobatek.net/download-home-edition.html | Patch Release Notes Vendor Advisory |
https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38337.html | Third Party Advisory |
https://mobaxterm.mobatek.net/download-home-edition.html | Patch Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 07:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38337.html - Third Party Advisory | |
References | () https://mobaxterm.mobatek.net/download-home-edition.html - Patch, Release Notes, Vendor Advisory |
Information
Published : 2022-12-06 00:15
Updated : 2024-11-21 07:16
NVD link : CVE-2022-38337
Mitre link : CVE-2022-38337
CVE.ORG link : CVE-2022-38337
JSON object : View
Products Affected
mobatek
- mobaxterm
CWE
CWE-798
Use of Hard-coded Credentials