OCTOBER 2018 |
libssh Authentication Bypass Vulnerability Affecting WALLIX Products
• A vulnerability in libssh could allow an unauthenticated, remote attacker to bypass authentication on a targeted system.
The vulnerability is due to improper authentication operations by the server-side state machine of the affected software. An attacker could exploit this vulnerability by presenting a SSH2_MSG_USERAUTH_SUCCESS message to a targeted system. A successful exploit could allow the attacker to bypass
Affected Products are all versions of WALLIX Bastion
As this impacts only configuration with SSH public key authentication on primary accounts, a workaround is to remove the public keys and use another authentication method (Password, X509, etc…)
This vulnerability is fixed in the latest supported versions of our software that are available on our download site.
Exploitation and Public Announcements
• WALLIX is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
• On October 16, 2018, libssh.org publicly disclosed this vulnerability in a security bulletin at the following link: https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/