SUSE Support

Here When You Need Us

SCP code vulnerabilities in multiple SSH implementations (aka CVE-2018-20685, CVE-2019-6109, CVE-2019-6110 & CVE-2019-6111)

This document (7023647) is provided subject to the disclaimer at the end of this document.


SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 15


Recently a series of vulnerabilities were discovered and published within the scp code of multiple SSH implementations (OpenSSH, PuTTY WinSCP).

The official advisory can be found here :


SUSE is working on reviewing and testing the updates for these CVE's, and expects the relevant updates to be released shortly. 

As an interim workaround to mitigate this problem, the suggestion is to use sftp instead of scp.


Additional Information

Note 1: These vulnerabilities are only exploitable when copying files from a malicious / compromised server.
Note 2: There is NO vulnerability in the protocol itself, nor in the SSH server and/or client. The vulnerability only exists in the scp utility.


This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7023647
  • Creation Date: 17-Jan-2019
  • Modified Date:03-Mar-2020
    • SUSE Linux Enterprise Server

< Back to Support Search

For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.