<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>This week, the libssh project announced a serious <a href="https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/" rel="noopener" target="_blank">bug</a> in versions of their library released in the last few years.</p> <!--more--> <p>libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message in which the server would expect to initiate authentication, the attacker could successfully authenticate without any credentials.</p> <p>Some people are calling it the Jedi mind <a href="https://arstechnica.com/information-technology/2018/10/bug-in-libssh-makes-it-amazingly-easy-for-hackers-to-gain-root-access/" rel="noopener" target="_blank">trick</a> hack, in that you say, “I am authenticated” and the server agrees with you. Or, in xkcd <a href="https://twitter.com/svblxyz/status/1052246725971169281" rel="noopener" target="_blank">terms</a>:</p> <p>&nbsp;</p> <p><img src="https://info.threatstop.com/hubfs/StickFigureBlog.png" alt="StickFigureBlog" width="383" style="width: 383px; display: block; margin: 0px auto;"></p> <p>Clearly, this rather fundamental failure to authenticate is a serious hole, and one that the bad guys<sup>TM</sup> are going to want to try and exploit now that they know about it.</p> <p>The seriousness of it for the Internet as a whole is mitigated by the fact that libssh is not used on many Linux servers to handle ssh connections. (They use openssh instead), but libssh is used by some. (e.g. <a href="https://twitter.com/GitHubSecurity/status/1052358402842746880" rel="noopener" target="_blank">GitHub</a> reported that they use but but were not affected. It is also used by various networked devices that have a Linux-based control plane, including some devices by F5 that are known to be <a href="https://support.f5.com/csp/article/K52868493" rel="noopener" target="_blank">vulnerable</a>) Needless to say, figuring out if your server or network device is vulnerable and, if so, when and how to patch it, is going to be a non-trivial task.</p> <p>Fortunately, ThreatSTOP protected networks have a bit more latitude if they are using any of our targets that include SSH attackers. (The standard “Inbound Attacks Tier 1” target and the expert ones such as the “TS Curated - SSH Crackers Attacks – IP” or “DenyHosts”) This is because scanners for this vulnerability will look exactly like scanners for almost any other SSH vulnerability. In fact, it is highly likely that they will be the exact same scanners that are used for regular SSH cracking.</p> <p style="text-align: center; font-weight: bold;"><em>Ready to try ThreatSTOP in your network? Want an expert-led demo to see how it works?</em></p> <p style="text-align: center;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<span style="background-color: transparent; font-size: 1em; text-align: center;">&nbsp;</span></p></span>