CVE-2023-46445
Terrapin SSH Connection Weakening
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue in AsyncSSH before 2.14.1 allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack, aka a "Rogue Extension Negotiation."
Un problema en AsyncSSH v2.14.0 y versiones anteriores permite a los atacantes controlar el mensaje de información de la extensión (RFC 8308) mediante un ataque de intermediario.
Fabian Bäumer, Marcus Brinkmann, and Joerg Schwenk discovered that AsyncSSH did not properly handle the extension info message. An attacker able to intercept communications could possibly use this issue to downgrade the algorithm used for client authentication. Fabian Bäumer, Marcus Brinkmann, and Joerg Schwenk discovered that AsyncSSH did not properly handle the user authentication request message. An attacker could possibly use this issue to control the remote end of an SSH client session via packet injection/removal and shell emulation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-10-23 CVE Reserved
- 2023-11-14 CVE Published
- 2023-12-20 First Exploit
- 2024-08-02 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-345: Insufficient Verification of Data Authenticity
CAPEC
References (8)
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/176280 | 2023-12-20 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Asyncssh Project Search vendor "Asyncssh Project" | Asyncssh Search vendor "Asyncssh Project" for product "Asyncssh" | < 2.14.1 Search vendor "Asyncssh Project" for product "Asyncssh" and version " < 2.14.1" | - |
Affected
|