OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
https://www.securityweek.com/juniper-networks-fixes-high-severity-vulnerabilities-in-junos-os/
https://www.openwall.com/lists/oss-security/2024/07/02/1
https://www.openssh.com/txt/release-9.8
https://www.freebsd.org/security/advisories/FreeBSD-SA-25:01.openssh.asc
https://security.netapp.com/advisory/ntap-20240712-0004/
https://news.ycombinator.com/item?id=41508530
https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
https://crzphil.github.io/posts/ssh-obfuscation-bypass/
http://www.openwall.com/lists/oss-security/2024/07/28/3
http://www.openwall.com/lists/oss-security/2024/07/23/6
Published: 2024-07-02
Updated: 2025-01-29
Named Vulnerability: Logic error in ssh(1) ObscureKeystrokeTiming
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.01248