HomeOpenbsdCVE-2020-15778

CVE-2020-15778

HIGH
7.4CVSS
Published: 2020-07-24
Updated: 2025-07-28
AI Analysis

Description

scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."

CVSS Metrics

Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
adjacent network
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-78CWE-78

Metadata

Primary Vendor
OPENBSD
Published
7/24/2020
Last Modified
7/28/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

openbsd : opensshopenbsd : opensshopenbsd : opensshnetapp : a700s_firmwarenetapp : active_iq_unified_managernetapp : hci_management_nodenetapp : solidfirenetapp : steelstore_cloud_integrated_storagenetapp : hci_compute_nodenetapp : hci_storage_nodebroadcom : fabric_operating_system

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2020-15778 | HIGH Severity | CVEDatabase.com | CVEDatabase.com