CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
65.5%
Debian LTS Advisory DLA-3104-1 [email protected]
https://www.debian.org/lts/security/ Chris Lamb
September 12, 2022 https://wiki.debian.org/LTS
Package : paramiko
Version : 2.4.2-0.1+deb10u1
CVE ID : CVE-2022-24302
Debian Bug : #1008012
It was discovered that there was a potential race condition in
Paramiko, a pure-Python implementation of the SSH algorithm. In
particular, unauthorised information disclosure could have occurred
during the creation of SSH private keys.
For Debian 10 buster, this problem has been fixed in version
2.4.2-0.1+deb10u1.
We recommend that you upgrade your paramiko packages.
For the detailed security status of paramiko please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/paramiko
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
65.5%