The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-15778

CVE-2020-15778: OpenSSH SCP Command Injection Vulnerability

CVE-2020-15778 is a command injection vulnerability in OpenSSH SCP affecting versions through 8.3p1. Attackers can exploit backtick characters in destination arguments to execute arbitrary commands on target systems.

Published: March 11, 2026

CVE-2020-15778 Overview

CVE-2020-15778 is a command injection vulnerability in the scp utility of OpenSSH through version 8.3p1. The vulnerability exists in the toremote function within scp.c, where improper handling of the destination argument allows attackers to inject and execute arbitrary commands. This is demonstrated through the use of backtick characters in the destination argument, which the shell interprets and executes.

The OpenSSH vendor has acknowledged this issue but has reportedly stated that they intentionally omit validation of "anomalous argument transfers" because implementing such validation could "stand a great chance of breaking existing workflows."

Critical Impact

Attackers with adjacent network access and low privileges can achieve arbitrary command execution on systems running vulnerable OpenSSH versions, potentially leading to full system compromise with high impact to confidentiality, integrity, and availability.

Affected Products

  • OpenBSD OpenSSH through 8.3p1
  • NetApp A700s Firmware
  • NetApp Active IQ Unified Manager (VMware vSphere)
  • NetApp HCI Management Node
  • NetApp SolidFire
  • NetApp SteelStore Cloud Integrated Storage
  • NetApp HCI Compute Node
  • NetApp HCI Storage Node
  • Broadcom Fabric Operating System

Discovery Timeline

  • 2020-07-24 - CVE-2020-15778 published to NVD
  • 2025-07-28 - Last updated in NVD database

Technical Details for CVE-2020-15778

Vulnerability Analysis

This vulnerability represents a classic command injection flaw (CWE-78: Improper Neutralization of Special Elements used in an OS Command) in the scp file transfer utility. The toremote function in scp.c fails to properly sanitize or validate destination arguments before passing them to the shell for execution.

When a user specifies a destination path containing shell metacharacters such as backticks (`), the scp utility does not escape or filter these characters. The shell subsequently interprets these metacharacters and executes any commands contained within them. This design decision was intentional by the OpenSSH developers to maintain backward compatibility with existing workflows that may rely on shell expansion features.

The vulnerability requires adjacent network access and some level of user interaction, as the victim must be tricked into executing an scp command with a malicious destination argument or an attacker must have the ability to influence the destination path in automated scripts.

Root Cause

The root cause of CVE-2020-15778 lies in the absence of input validation for shell metacharacters in the destination argument handling within the toremote function. The scp utility relies on the underlying shell to process file paths and remote specifications, which means any embedded shell commands in the destination string will be executed. This architectural decision prioritizes flexibility and backward compatibility over security, allowing shell expansion and command substitution to occur during file transfer operations.

Attack Vector

The attack requires adjacent network access with low privileges and user interaction. An attacker can exploit this vulnerability by crafting a malicious scp destination argument that includes backtick-enclosed commands. When the victim executes scp with this crafted destination, the commands within the backticks are executed with the privileges of the user running scp.

For example, an attacker could provide a destination path such as `malicious_command`@host:/path that, when processed by scp, would cause the shell to execute the embedded command before attempting the file transfer. This attack vector is particularly dangerous in environments where scp commands are generated programmatically using untrusted input, or where users can be socially engineered into copying files to attacker-controlled destinations.

The vulnerability mechanism involves the shell's command substitution feature being triggered during the parsing of the destination argument. When scp constructs the remote command to execute on the target system, it passes the destination through the shell without proper escaping, allowing embedded commands to execute. Technical details and proof-of-concept demonstrations can be found in the GitHub CVE-2020-15778 Repository.

Detection Methods for CVE-2020-15778

Indicators of Compromise

  • Unusual scp commands in shell history or process logs containing backtick characters or $() command substitution syntax in destination arguments
  • Unexpected child processes spawned from scp process execution
  • Anomalous network connections or system changes coinciding with scp file transfer operations
  • Log entries showing scp operations with destination paths containing shell metacharacters

Detection Strategies

  • Monitor process execution chains for scp spawning unexpected child processes or commands
  • Implement command-line argument logging and analysis to detect shell metacharacters in scp destination parameters
  • Deploy endpoint detection rules to alert on scp commands containing backticks, $(), or other shell expansion syntax
  • Review automated scripts and applications that construct scp commands dynamically for potential injection points

Monitoring Recommendations

  • Enable comprehensive audit logging for all scp command executions across the environment
  • Implement real-time alerting for scp commands with suspicious destination argument patterns
  • Monitor for process genealogy anomalies where scp appears as a parent to unexpected command executions
  • Correlate scp activity logs with user behavior analytics to identify abnormal usage patterns

How to Mitigate CVE-2020-15778

Immediate Actions Required

  • Audit all automated scripts and applications that use scp to ensure destination arguments are not derived from untrusted user input
  • Implement strict input validation for any system that programmatically constructs scp commands
  • Consider migrating to sftp or rsync over SSH as more secure alternatives that do not suffer from this command injection vulnerability
  • Educate users about the risks of executing scp commands with untrusted destination arguments

Patch Information

The OpenSSH vendor has acknowledged this vulnerability but has not released a traditional patch, as they consider the behavior intentional to maintain backward compatibility. Organizations should refer to the OpenSSH Security Information page for official guidance.

Several distributions have released advisories and mitigations:

  • Red Hat Security Advisory RHSA-2024:3166
  • Gentoo GLSA 2022-12-06
  • NetApp Security Advisory NTAP-20200731-0007

Workarounds

  • Use sftp instead of scp for secure file transfers, as it does not pass arguments through the shell in the same manner
  • Implement wrapper scripts that validate and sanitize scp destination arguments before execution
  • Restrict scp usage through policy controls and provide approved secure alternatives for file transfer operations
  • Configure shell environments to log and alert on scp commands containing potentially dangerous metacharacters
bash
# Example: Use sftp as a secure alternative to scp
# Instead of: scp file.txt user@host:/path
sftp user@host <<EOF
put file.txt /path/
EOF

# Or use rsync over SSH for more robust file transfers
rsync -avz -e ssh file.txt user@host:/path/

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechOpenssh

  • SeverityHIGH

  • CVSS Score7.4

  • EPSS Probability61.48%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-78
  • Technical References
  • Red Hat Security Advisory RHSA-2024:3166

  • GitHub CVE-2020-15778 Repository

  • Hacker News Discussion #25005567

  • Gentoo GLSA 2022-12-06

  • NetApp Security Advisory NTAP-20200731-0007
  • Vendor Resources
  • OpenSSH Security Information
  • Related CVEs
  • CVE-2025-61984: OpenSSH RCE Vulnerability

  • CVE-2023-51385: OpenBSD OpenSSH RCE Vulnerability

  • CVE-2024-6409: OpenSSH sshd Race Condition RCE Vulnerability

  • CVE-2023-38408: OpenBSD OpenSSH ssh-agent RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English