CVE-2019-19755

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform man-in-the-middle attacks on SSH connections to ethOS mining rigs and easily identify all public IPv4 nodes running vulnerable versions. It affects all ethOS installations through version 1.3.3 that use the default SSH configuration. The issue stems from hardcoded SSH host keys in the installation image.

💻 Affected Systems

Products:
  • ethOS
Versions: through 1.3.3
Operating Systems: ethOS (Linux-based mining distribution)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. Systems must have SSH enabled and be accessible via network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of mining rigs via SSH man-in-the-middle attacks leading to cryptocurrency theft, malware installation, or botnet recruitment.

🟠

Likely Case

Unauthorized SSH access to mining rigs, configuration changes, or monitoring of mining operations.

🟢

If Mitigated

Limited to identification of vulnerable systems via Shodan scanning without successful exploitation if SSH keys are regenerated.

🌐 Internet-Facing: HIGH - All internet-facing ethOS systems with SSH enabled are trivially identifiable and vulnerable to MITM attacks.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to MITM attacks from compromised internal hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access and ability to intercept SSH traffic. Shodan scanning makes target identification trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.3.3

Vendor Advisory: http://ethosdistro.com/changelog/

Restart Required: No

Instructions:

1. Update ethOS to latest version. 2. Regenerate SSH host keys using 'ssh-keygen -A'. 3. Restart SSH service.

🔧 Temporary Workarounds

Regenerate SSH Host Keys

linux

Generate unique SSH host keys for each system to prevent key reuse

sudo rm /etc/ssh/ssh_host_*
sudo ssh-keygen -A
sudo systemctl restart ssh

Disable SSH or Restrict Access

linux

Disable SSH service or restrict to trusted networks only

sudo systemctl disable ssh
sudo systemctl stop ssh

🧯 If You Can't Patch

  • Regenerate SSH host keys on all systems immediately
  • Implement network segmentation and firewall rules to restrict SSH access to trusted sources only

🔍 How to Verify

Check if Vulnerable:

Check if SSH host keys match known vulnerable fingerprints: 'ssh-keyscan localhost' and compare with known vulnerable keys from references

Check Version:

cat /etc/ethos-version

Verify Fix Applied:

Verify SSH host keys are unique: 'ssh-keyscan localhost' should show different keys than other systems

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH login attempts from unexpected sources
  • SSH host key warnings in client logs

Network Indicators:

  • SSH traffic to mining rigs from unexpected sources
  • Shodan scans targeting port 22

SIEM Query:

source="ssh" AND (event="Failed password" OR event="Invalid user") | stats count by src_ip

🔗 References

📤 Share & Export