News

Thousands of Servers Vulnerable to Hijacking Due to Libssh Vulnerability

By Nitish Singh / October 17, 2018

A Libssh bug that was discovered by Peter Winter-Smith of NCC group may have compromised thousands of enterprise servers due to a coding error. Enterprise servers make use of the SSH library, and they have been left open to attacks due to the error in coding. The vulnerability allows attackers to ignore authentication procedures and get access to any server that has SSH connection enabled on them.

While the vulnerability is critical when it comes to coding, the issue is not very likely to have real-world consequences because most servers that are vulnerable take advantage of SSH support via the OpenSSH library instead of libssh. The same applies to personal computers and IoT devices as well.

Websites like GitHub that take advantage of libssh have gone on record and have stated that they have not been affected after analysis. Fortunately, Github’s libssh-based login was secured which prevented an attack. Github revealed on Twitter “ We use a custom version of libssh; SSH2_MSG_USERAUTH_SUCCESS with the libssh server is not relied upon for pubkey-based auth, which is what we use the library for. Patches have been applied out of an abundance of caution, but [GitHub Enterprise] was never vulnerable to CVE-2018-10933”.

The vulnerability is present only server side, and if you have a libssh-based SSH client on your computer, it will not allow an attacker to break into your system unless the client is also designed to run it as an SSH server. The exploit has not been made public yet but it is likely to be published in the coming days, and a patch has already been deployed. Most major companies that used the technology have already secured themselves from attacks, which minimizes the risk of the exploit being abused.

What do you think about the secure shell exploit? Let us know in the comments below. Also, make sure to follow us on Facebook and Twitter. Thanks!



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari