CVE-2023-51767
📋 TL;DR
This CVE describes a potential row hammer attack vulnerability in OpenSSH that could allow authentication bypass. An attacker with physical access to the same hardware could flip bits in memory to bypass SSH authentication. This affects OpenSSH versions through 10.0 when running on systems with susceptible DRAM.
💻 Affected Systems
- OpenSSH
📦 What is this software?
Fedora by Fedoraproject
Openssh by Openbsd
⚠️ Risk & Real-World Impact
Worst Case
Complete SSH authentication bypass allowing unauthorized access to systems
Likely Case
Limited impact requiring physical co-location and specific hardware conditions
If Mitigated
Minimal impact with proper physical security and hardware protections
🎯 Exploit Status
Requires physical access to hardware, specific DRAM types, and precise timing conditions
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not applicable - disputed by OpenSSH maintainers
Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2255850
Restart Required: No
Instructions:
No official patch available as OpenSSH maintainers dispute this is an application-level vulnerability
🔧 Temporary Workarounds
Hardware-based mitigation
allUse ECC memory or DRAM less susceptible to row hammer attacks
Physical security controls
allImplement strict physical access controls to prevent co-location attacks
🧯 If You Can't Patch
- Implement strict physical security controls to prevent unauthorized hardware access
- Use hardware with ECC memory or row hammer-resistant DRAM
🔍 How to Verify
Check if Vulnerable:
Check OpenSSH version with 'ssh -V' and verify if version is 10.0 or earlier
Check Version:
ssh -V 2>&1 | grep -o 'OpenSSH_[0-9.]*'
Verify Fix Applied:
No fix available to verify - focus on hardware and physical security controls
📡 Detection & Monitoring
Log Indicators:
- Unusual authentication patterns from unexpected physical locations
Network Indicators:
- None - this is a physical hardware attack
SIEM Query:
Search for SSH authentication failures followed by successful logins from same physical location
🔗 References
- https://access.redhat.com/security/cve/CVE-2023-51767
- https://arxiv.org/abs/2309.02545
- https://bugzilla.redhat.com/show_bug.cgi?id=2255850
- https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77
- https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878
- https://security.netapp.com/advisory/ntap-20240125-0006/
- https://ubuntu.com/security/CVE-2023-51767
- https://www.openwall.com/lists/oss-security/2025/09/22/1
- http://www.openwall.com/lists/oss-security/2025/09/22/1
- http://www.openwall.com/lists/oss-security/2025/09/22/2
- http://www.openwall.com/lists/oss-security/2025/09/23/1
- http://www.openwall.com/lists/oss-security/2025/09/23/3
- http://www.openwall.com/lists/oss-security/2025/09/23/4
- http://www.openwall.com/lists/oss-security/2025/09/23/5
- http://www.openwall.com/lists/oss-security/2025/09/24/4
- http://www.openwall.com/lists/oss-security/2025/09/24/7
- http://www.openwall.com/lists/oss-security/2025/09/25/2
- http://www.openwall.com/lists/oss-security/2025/09/25/6
- http://www.openwall.com/lists/oss-security/2025/09/26/2
- http://www.openwall.com/lists/oss-security/2025/09/26/4
- http://www.openwall.com/lists/oss-security/2025/09/27/1
- http://www.openwall.com/lists/oss-security/2025/09/27/2
- http://www.openwall.com/lists/oss-security/2025/09/27/3
- http://www.openwall.com/lists/oss-security/2025/09/27/4
- http://www.openwall.com/lists/oss-security/2025/09/27/5
- http://www.openwall.com/lists/oss-security/2025/09/27/6
- http://www.openwall.com/lists/oss-security/2025/09/27/7
- http://www.openwall.com/lists/oss-security/2025/09/28/7
- http://www.openwall.com/lists/oss-security/2025/09/29/1
- http://www.openwall.com/lists/oss-security/2025/09/29/4
- http://www.openwall.com/lists/oss-security/2025/09/29/5
- http://www.openwall.com/lists/oss-security/2025/09/29/6
- http://www.openwall.com/lists/oss-security/2025/10/01/1
- http://www.openwall.com/lists/oss-security/2025/10/01/2
- https://access.redhat.com/security/cve/CVE-2023-51767
- https://arxiv.org/abs/2309.02545
- https://bugzilla.redhat.com/show_bug.cgi?id=2255850
- https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77
- https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878
- https://security.netapp.com/advisory/ntap-20240125-0006/
- https://ubuntu.com/security/CVE-2023-51767