CVE-2019-19752

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform man-in-the-middle attacks against SSH connections to nvOC mining rigs and easily identify all vulnerable systems using public scanning tools. It affects all nvOC installations through version 3.2 that use the default installation image with baked-in SSH host keys.

💻 Affected Systems

Products:
  • nvOC (NVIDIA Open Cryptocurrency Mining Rig Operating System)
Versions: Through version 3.2
Operating Systems: Linux-based mining OS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the standard image are vulnerable. Custom installations with regenerated SSH keys are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of mining rigs via SSH man-in-the-middle attacks leading to cryptocurrency theft, malware installation, or botnet recruitment.

🟠

Likely Case

Unauthorized SSH access to mining rigs, configuration changes, or monitoring of mining operations.

🟢

If Mitigated

Limited to network reconnaissance and identification of vulnerable systems without successful exploitation.

🌐 Internet-Facing: HIGH - SSH keys are publicly identifiable via Shodan.io scanning, making all internet-facing systems easily discoverable.
🏢 Internal Only: MEDIUM - Internal attackers could still perform man-in-the-middle attacks if they can intercept SSH traffic.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network position for man-in-the-middle or ability to intercept SSH traffic. Public scanning tools like Shodan.io can identify all vulnerable systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.2 (vendor indicated plans to fix in next image build as of 2019-12-01)

Vendor Advisory: https://github.com/papampi/nvOC_by_fullzero_Community_Release/commits/release

Restart Required: Yes

Instructions:

1. Update to latest nvOC version after 3.2. 2. Regenerate SSH host keys on all systems. 3. Restart SSH service. 4. Update known_hosts files on all client systems.

🔧 Temporary Workarounds

Regenerate SSH Host Keys

linux

Manually regenerate unique SSH host keys for each system

sudo rm /etc/ssh/ssh_host_*
sudo dpkg-reconfigure openssh-server
sudo systemctl restart ssh

Disable SSH or Restrict Access

linux

Disable SSH service or restrict to internal networks only

sudo systemctl disable ssh
sudo systemctl stop ssh

🧯 If You Can't Patch

  • Implement network segmentation to isolate mining rigs from untrusted networks
  • Use VPN or SSH bastion hosts with certificate-based authentication for remote access

🔍 How to Verify

Check if Vulnerable:

Check if SSH host key fingerprint matches known vulnerable keys: ssh-keyscan -t rsa,dsa,ecdsa,ed25519 <host> | ssh-keygen -lf -

Check Version:

Check nvOC version in system documentation or /etc/os-release

Verify Fix Applied:

Verify SSH host keys are unique by comparing fingerprints across multiple systems

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed SSH authentication attempts
  • SSH connections from unexpected sources
  • Changes to SSH configuration files

Network Indicators:

  • SSH traffic to/from mining rigs on non-standard ports
  • Shodan.io scans targeting SSH services

SIEM Query:

source="ssh" AND (event="Failed password" OR event="Accepted password") AND dest_ip IN [mining_rig_ips]

🔗 References

📤 Share & Export