{"uuid": "1cd1db64-2b9e-47ee-b794-22543ec059a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7971", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47857\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access.\n\ud83d\udccf Published: 2025-01-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T19:40:31.796Z\n\ud83d\udd17 References:\n1. https://ssh.com\n2. https://info.ssh.com/impersonation-vulnerability-privx", "creation_timestamp": "2025-03-18T19:48:41.000000Z"}