CVE Vulnerabilities

CVE-2021-36369

Improper Authentication

Published: Oct 12, 2022 | Modified: May 15, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Dropbear_sshDropbear_ssh_project*2020.81 (including)
DropbearUbuntubionic*
DropbearUbuntudevel*
DropbearUbuntuesm-apps/bionic*
DropbearUbuntuesm-apps/focal*
DropbearUbuntuesm-apps/jammy*
DropbearUbuntuesm-apps/noble*
DropbearUbuntuesm-apps/xenial*
DropbearUbuntufocal*
DropbearUbuntujammy*
DropbearUbuntukinetic*
DropbearUbuntulunar*
DropbearUbuntumantic*
DropbearUbuntunoble*
DropbearUbuntuoracular*
DropbearUbuntuplucky*
DropbearUbuntuquesting*
DropbearUbuntutrusty*
DropbearUbuntuupstream*
DropbearUbuntuxenial*

Potential Mitigations

References