PatchSiren cyber security CVE debrief
CVE-2016-7408 Dropbear SSH Project CVE debrief
CVE-2016-7408 is a high-severity flaw in Dropbear SSH’s dbclient component. Versions through 2016.73 are affected, and the issue was publicly disclosed on 2017-03-03. NVD rates the impact as high and maps the weakness to CWE-284 (Improper Access Control).
- Vendor
- Dropbear SSH Project
- Product
- CVE-2016-7408
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-03
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-03
- Advisory updated
- 2026-05-13
Who should care
Administrators, developers, and product teams that ship or rely on Dropbear SSH dbclient on systems running versions 2016.73 or earlier should prioritize this issue, especially where the client is used in automated or user-facing SSH workflows.
Technical summary
The vulnerability is described as arbitrary code execution in dbclient when handling crafted -m or -c arguments. NVD classifies the issue under CWE-284 and assigns a CVSS v3.0 vector of AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating high impact with no user interaction required and only low privileges needed in the modeled attack context. The vulnerable range in NVD covers Dropbear SSH through 2016.73, with the vendor patch reference linked in the project repository.
Defensive priority
High. The combination of code execution impact and broad confidentiality, integrity, and availability consequences makes this a priority for patch verification and inventory review.
Recommended defensive actions
- Confirm whether Dropbear SSH versions 2016.73 or earlier are deployed anywhere in your environment.
- Upgrade to a fixed Dropbear SSH release at or above 2016.74, or apply the vendor-provided patch referenced in the project repository.
- Review any products or appliances that bundle Dropbear SSH, since embedded copies may lag behind upstream releases.
- Validate exposure in automation, scripts, and management tooling that invoke dbclient.
- Use official advisories and downstream notices to cross-check remediation status across distributions.
Evidence notes
Public disclosure is dated 2017-03-03 in the CVE record. NVD’s modified record lists affected versions through 2016.73 and references the upstream patch revision eed9376a4ad6, the Openwall oss-security discussion, a Red Hat issue tracker entry, and a Gentoo GLSA. The official CVE and NVD records are the primary sources for this debrief.
Official resources
-
CVE-2016-7408 CVE record
CVE.org
-
CVE-2016-7408 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Source reference
[email protected] - Issue Tracking
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Third Party Advisory, VDB Entry
Publicly disclosed on 2017-03-03. The NVD record was modified later, but that does not change the original CVE publication date.