CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A malicious SCP server can send unexpected paths that could make the client application override local files outside of working directory. This could be misused to create malicious executable or configuration files and make the user execute them under specific consequences. This is the same issue as in OpenSSH, tracked as CVE-2019-6111.
Analysis
SCP client implementations across Red Hat Enterprise Linux 6-10 and OpenShift Container Platform 4 are vulnerable to path traversal during file transfer, allowing a malicious SCP server to write files outside the designated working directory and potentially execute arbitrary code or modify system configuration. This vulnerability mirrors CVE-2019-6111 in OpenSSH; unauthenticated remote attackers can exploit it with high user interaction (the victim must initiate an SCP connection to a malicious server), resulting in confidentiality, integrity, and availability compromise. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 30 days: Identify affected systems and apply vendor patches as part of regular patch cycle. Review file handling controls.
Sign in for detailed remediation steps.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| upstream | released | 0.11.4 |
| jammy | released | 0.9.6-2ubuntu0.22.04.6 |
| noble | released | 0.10.6-2ubuntu0.3 |
| questing | released | 0.11.2-1ubuntu0.2 |
| bionic | released | 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm6 |
| focal | released | 0.9.3-2ubuntu2.5+esm3 |
| xenial | released | 0.6.3-4.3ubuntu0.6+esm4 |
Debian
Bug #1127693| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | vulnerable | 0.9.8-0+deb11u1 | - |
| bullseye (security) | vulnerable | 0.9.8-0+deb11u2 | - |
| bookworm | vulnerable | 0.10.6-0+deb12u2 | - |
| bookworm (security) | vulnerable | 0.10.6-0+deb12u1 | - |
| trixie | vulnerable | 0.11.2-1+deb13u1 | - |
| forky | vulnerable | 0.11.3-1 | - |
| sid | fixed | 0.12.0-3 | - |
| (unstable) | fixed | 0.12.0-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-16326