Description
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVSS Metrics
- Vector
- CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Attack Vector
- adjacent network
- Complexity
- low
- Privileges
- low
- User Action
- required
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-78CWE-78
Metadata
- Primary Vendor
- OPENBSD
- Published
- 7/24/2020
- Last Modified
- 7/28/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
openbsd : opensshopenbsd : opensshopenbsd : opensshnetapp : a700s_firmwarenetapp : active_iq_unified_managernetapp : hci_management_nodenetapp : solidfirenetapp : steelstore_cloud_integrated_storagenetapp : hci_compute_nodenetapp : hci_storage_nodebroadcom : fabric_operating_system
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.