CVE-2021-36370
CBL Mariner vulnerability analysis and mitigation

Overview

An issue was discovered in Midnight Commander through version 4.8.26 (CVE-2021-36370). When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed, resulting in users connecting to servers without the ability to verify their authenticity. The vulnerability was discovered and reported by Manfred KAISER from AUT-milCERT during an audit of open source software (GNOME Archives).

Technical details

The vulnerability stems from a design flaw in the SFTP VFS (Virtual File System) implementation where server fingerprints were computed but not verified during connection establishment. The issue received a CVSS v3.1 Base Score of 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, indicating network accessibility, low attack complexity, and high impact on integrity (NVD).

Impact

The vulnerability allows an attacker to potentially perform man-in-the-middle attacks, as users have no way to verify the authenticity of the SFTP server they are connecting to. This could lead to unauthorized access to sensitive information or compromise of data integrity during file transfers (GNOME Archives).

Mitigation and workarounds

The issue was fixed in Midnight Commander version 4.8.27. Users are strongly recommended to upgrade to this version or later to address the security vulnerability. The fix implements proper server fingerprint verification during SFTP connections (GNOME Archives).

Community reactions

The vulnerability was responsibly disclosed by AUT-milCERT, and the Midnight Commander development team promptly addressed the issue. The project team acknowledged and thanked AUT-milCERT for finding and responsibly disclosing the vulnerability (GNOME Archives).

Additional resources


SourceThis report was generated using AI

Related CBL Mariner vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62689HIGH8.7
  • NixOSNixOS
  • libmicrohttpd-devel
NoYesNov 10, 2025
CVE-2025-59777HIGH8.7
  • NixOSNixOS
  • libmicrohttpd-doc
NoYesNov 10, 2025
CVE-2025-47913HIGH7.5
  • PackerPacker
  • container-tools:rhel8::buildah-tests
NoYesNov 13, 2025
CVE-2024-47866HIGH7.5
  • CBL MarinerCBL Mariner
  • ceph
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules
NoYesNov 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management