CVE-2023-5616

In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:control_center:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:control_center:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:control_center:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:control_center:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-04-15 19:16

Updated : 2025-08-26 16:34


NVD link : CVE-2023-5616

Mitre link : CVE-2023-5616

CVE.ORG link : CVE-2023-5616


JSON object : View

Products Affected

canonical

  • ubuntu_linux

gnome

  • control_center
CWE
CWE-290

Authentication Bypass by Spoofing