CVE-2023-46446
Terrapin SSH Connection Weakening
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."
Un problema en AsyncSSH v2.14.0 y versiones anteriores permite a los atacantes controlar el final remoto de una sesión de cliente SSH mediante inyección/eliminación de paquetes y emulación de shell.
Fabian Bäumer, Marcus Brinkmann, and Joerg Schwenk discovered that AsyncSSH did not properly handle the extension info message. An attacker able to intercept communications could possibly use this issue to downgrade the algorithm used for client authentication. Fabian Bäumer, Marcus Brinkmann, and Joerg Schwenk discovered that AsyncSSH did not properly handle the user authentication request message. An attacker could possibly use this issue to control the remote end of an SSH client session via packet injection/removal and shell emulation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-10-23 CVE Reserved
- 2023-11-14 CVE Published
- 2023-12-20 First Exploit
- 2024-08-02 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
References (8)
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/176280 | 2023-12-20 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Asyncssh Project Search vendor "Asyncssh Project" | Asyncssh Search vendor "Asyncssh Project" for product "Asyncssh" | < 2.14.1 Search vendor "Asyncssh Project" for product "Asyncssh" and version " < 2.14.1" | - |
Affected
|