Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-48795

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-18 Dec, 2023 | 00:00
Updated At-04 Nov, 2025 | 22:05
Rejected At-
Credits

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:18 Dec, 2023 | 00:00
Updated At:04 Nov, 2025 | 22:05
Rejected At:
▼CVE Numbering Authority (CNA)

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
N/A
https://matt.ucc.asn.au/dropbear/CHANGES
N/A
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
N/A
https://www.netsarang.com/en/xshell-update-history/
N/A
https://www.paramiko.org/changelog.html
N/A
https://www.openssh.com/openbsd.html
N/A
https://github.com/openssh/openssh-portable/commits/master
N/A
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
N/A
https://www.bitvise.com/ssh-server-version-history
N/A
https://github.com/ronf/asyncssh/tags
N/A
https://gitlab.com/libssh/libssh-mirror/-/tags
N/A
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
N/A
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
N/A
https://www.openssh.com/txt/release-9.6
N/A
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
N/A
https://www.terrapin-attack.com
N/A
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
N/A
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
N/A
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
N/A
https://github.com/warp-tech/russh/releases/tag/v0.40.2
N/A
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
N/A
https://www.openwall.com/lists/oss-security/2023/12/18/2
N/A
https://twitter.com/TrueSkrillor/status/1736774389725565005
N/A
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
N/A
https://github.com/paramiko/paramiko/issues/2337
N/A
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
N/A
https://news.ycombinator.com/item?id=38684904
N/A
https://news.ycombinator.com/item?id=38685286
N/A
http://www.openwall.com/lists/oss-security/2023/12/18/3
mailing-list
https://github.com/mwiede/jsch/issues/457
N/A
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
N/A
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
N/A
https://github.com/advisories/GHSA-45x7-px36-x8w8
N/A
https://security-tracker.debian.org/tracker/source-package/libssh2
N/A
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
N/A
https://security-tracker.debian.org/tracker/CVE-2023-48795
N/A
https://bugzilla.suse.com/show_bug.cgi?id=1217950
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
N/A
https://bugs.gentoo.org/920280
N/A
https://ubuntu.com/security/CVE-2023-48795
N/A
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
N/A
https://access.redhat.com/security/cve/cve-2023-48795
N/A
https://github.com/mwiede/jsch/pull/461
N/A
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
N/A
https://github.com/libssh2/libssh2/pull/1291
N/A
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
N/A
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
N/A
https://github.com/rapier1/hpn-ssh/releases
N/A
https://github.com/proftpd/proftpd/issues/456
N/A
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
N/A
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
N/A
https://oryx-embedded.com/download/#changelog
N/A
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
N/A
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
N/A
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
N/A
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
N/A
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
N/A
https://crates.io/crates/thrussh/versions
N/A
https://github.com/NixOS/nixpkgs/pull/275249
N/A
http://www.openwall.com/lists/oss-security/2023/12/19/5
mailing-list
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
N/A
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
N/A
http://www.openwall.com/lists/oss-security/2023/12/20/3
mailing-list
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
N/A
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
N/A
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
N/A
https://github.com/apache/mina-sshd/issues/445
N/A
https://github.com/hierynomus/sshj/issues/916
N/A
https://github.com/janmojzis/tinyssh/issues/81
N/A
https://www.openwall.com/lists/oss-security/2023/12/20/3
N/A
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
N/A
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
vendor-advisory
https://www.debian.org/security/2023/dsa-5586
vendor-advisory
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
N/A
https://www.theregister.com/2023/12/20/terrapin_attack_ssh
N/A
https://filezilla-project.org/versions.php
N/A
https://nova.app/releases/#v11.8
N/A
https://roumenpetrov.info/secsh/#news20231220
N/A
https://www.vandyke.com/products/securecrt/history.txt
N/A
https://help.panic.com/releasenotes/transmit5/
N/A
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
N/A
https://github.com/PowerShell/Win32-OpenSSH/issues/2189
N/A
https://winscp.net/eng/docs/history#6.2.2
N/A
https://www.bitvise.com/ssh-client-version-history#933
N/A
https://github.com/cyd01/KiTTY/issues/520
N/A
https://www.debian.org/security/2023/dsa-5588
vendor-advisory
https://github.com/ssh-mitm/ssh-mitm/issues/165
N/A
https://news.ycombinator.com/item?id=38732005
N/A
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
mailing-list
https://security.gentoo.org/glsa/202312-16
vendor-advisory
https://security.gentoo.org/glsa/202312-17
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
vendor-advisory
https://security.netapp.com/advisory/ntap-20240105-0004/
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
vendor-advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
vendor-advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
mailing-list
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
mailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
vendor-advisory
https://support.apple.com/kb/HT214084
N/A
http://seclists.org/fulldisclosure/2024/Mar/21
mailing-list
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
mailing-list
http://www.openwall.com/lists/oss-security/2024/04/17/8
mailing-list
http://www.openwall.com/lists/oss-security/2024/03/06/3
mailing-list
Hyperlink: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Resource: N/A
Hyperlink: https://matt.ucc.asn.au/dropbear/CHANGES
Resource: N/A
Hyperlink: https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Resource: N/A
Hyperlink: https://www.netsarang.com/en/xshell-update-history/
Resource: N/A
Hyperlink: https://www.paramiko.org/changelog.html
Resource: N/A
Hyperlink: https://www.openssh.com/openbsd.html
Resource: N/A
Hyperlink: https://github.com/openssh/openssh-portable/commits/master
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
Resource: N/A
Hyperlink: https://www.bitvise.com/ssh-server-version-history
Resource: N/A
Hyperlink: https://github.com/ronf/asyncssh/tags
Resource: N/A
Hyperlink: https://gitlab.com/libssh/libssh-mirror/-/tags
Resource: N/A
Hyperlink: https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
Resource: N/A
Hyperlink: https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
Resource: N/A
Hyperlink: https://www.openssh.com/txt/release-9.6
Resource: N/A
Hyperlink: https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
Resource: N/A
Hyperlink: https://www.terrapin-attack.com
Resource: N/A
Hyperlink: https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
Resource: N/A
Hyperlink: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
Resource: N/A
Hyperlink: https://thorntech.com/cve-2023-48795-and-sftp-gateway/
Resource: N/A
Hyperlink: https://github.com/warp-tech/russh/releases/tag/v0.40.2
Resource: N/A
Hyperlink: https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
Resource: N/A
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/18/2
Resource: N/A
Hyperlink: https://twitter.com/TrueSkrillor/status/1736774389725565005
Resource: N/A
Hyperlink: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
Resource: N/A
Hyperlink: https://github.com/paramiko/paramiko/issues/2337
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
Resource: N/A
Hyperlink: https://news.ycombinator.com/item?id=38684904
Resource: N/A
Hyperlink: https://news.ycombinator.com/item?id=38685286
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/18/3
Resource:
mailing-list
Hyperlink: https://github.com/mwiede/jsch/issues/457
Resource: N/A
Hyperlink: https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
Resource: N/A
Hyperlink: https://github.com/erlang/otp/releases/tag/OTP-26.2.1
Resource: N/A
Hyperlink: https://github.com/advisories/GHSA-45x7-px36-x8w8
Resource: N/A
Hyperlink: https://security-tracker.debian.org/tracker/source-package/libssh2
Resource: N/A
Hyperlink: https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
Resource: N/A
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2023-48795
Resource: N/A
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=1217950
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2254210
Resource: N/A
Hyperlink: https://bugs.gentoo.org/920280
Resource: N/A
Hyperlink: https://ubuntu.com/security/CVE-2023-48795
Resource: N/A
Hyperlink: https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/cve-2023-48795
Resource: N/A
Hyperlink: https://github.com/mwiede/jsch/pull/461
Resource: N/A
Hyperlink: https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
Resource: N/A
Hyperlink: https://github.com/libssh2/libssh2/pull/1291
Resource: N/A
Hyperlink: https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Resource: N/A
Hyperlink: https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
Resource: N/A
Hyperlink: https://github.com/rapier1/hpn-ssh/releases
Resource: N/A
Hyperlink: https://github.com/proftpd/proftpd/issues/456
Resource: N/A
Hyperlink: https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
Resource: N/A
Hyperlink: https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
Resource: N/A
Hyperlink: https://oryx-embedded.com/download/#changelog
Resource: N/A
Hyperlink: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Resource: N/A
Hyperlink: https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
Resource: N/A
Hyperlink: https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
Resource: N/A
Hyperlink: https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
Resource: N/A
Hyperlink: https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
Resource: N/A
Hyperlink: https://crates.io/crates/thrussh/versions
Resource: N/A
Hyperlink: https://github.com/NixOS/nixpkgs/pull/275249
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/19/5
Resource:
mailing-list
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
Resource: N/A
Hyperlink: https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/3
Resource:
mailing-list
Hyperlink: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
Resource: N/A
Hyperlink: https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
Resource: N/A
Hyperlink: https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
Resource: N/A
Hyperlink: https://github.com/apache/mina-sshd/issues/445
Resource: N/A
Hyperlink: https://github.com/hierynomus/sshj/issues/916
Resource: N/A
Hyperlink: https://github.com/janmojzis/tinyssh/issues/81
Resource: N/A
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/20/3
Resource: N/A
Hyperlink: https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
Resource: N/A
Hyperlink: https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Resource:
vendor-advisory
Hyperlink: https://www.debian.org/security/2023/dsa-5586
Resource:
vendor-advisory
Hyperlink: https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
Resource: N/A
Hyperlink: https://www.theregister.com/2023/12/20/terrapin_attack_ssh
Resource: N/A
Hyperlink: https://filezilla-project.org/versions.php
Resource: N/A
Hyperlink: https://nova.app/releases/#v11.8
Resource: N/A
Hyperlink: https://roumenpetrov.info/secsh/#news20231220
Resource: N/A
Hyperlink: https://www.vandyke.com/products/securecrt/history.txt
Resource: N/A
Hyperlink: https://help.panic.com/releasenotes/transmit5/
Resource: N/A
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
Resource: N/A
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2189
Resource: N/A
Hyperlink: https://winscp.net/eng/docs/history#6.2.2
Resource: N/A
Hyperlink: https://www.bitvise.com/ssh-client-version-history#933
Resource: N/A
Hyperlink: https://github.com/cyd01/KiTTY/issues/520
Resource: N/A
Hyperlink: https://www.debian.org/security/2023/dsa-5588
Resource:
vendor-advisory
Hyperlink: https://github.com/ssh-mitm/ssh-mitm/issues/165
Resource: N/A
Hyperlink: https://news.ycombinator.com/item?id=38732005
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
Resource:
mailing-list
Hyperlink: https://security.gentoo.org/glsa/202312-16
Resource:
vendor-advisory
Hyperlink: https://security.gentoo.org/glsa/202312-17
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
Resource:
vendor-advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240105-0004/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Resource:
vendor-advisory
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Resource:
vendor-advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
Resource:
mailing-list
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
Resource:
mailing-list
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Resource:
vendor-advisory
Hyperlink: https://support.apple.com/kb/HT214084
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2024/Mar/21
Resource:
mailing-list
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
Resource:
mailing-list
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/17/8
Resource:
mailing-list
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/06/3
Resource:
mailing-list
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit
N/A
https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability
N/A
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
x_transferred
https://matt.ucc.asn.au/dropbear/CHANGES
x_transferred
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
x_transferred
https://www.netsarang.com/en/xshell-update-history/
x_transferred
https://www.paramiko.org/changelog.html
x_transferred
https://www.openssh.com/openbsd.html
x_transferred
https://github.com/openssh/openssh-portable/commits/master
x_transferred
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
x_transferred
https://www.bitvise.com/ssh-server-version-history
x_transferred
https://github.com/ronf/asyncssh/tags
x_transferred
https://gitlab.com/libssh/libssh-mirror/-/tags
x_transferred
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
x_transferred
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
x_transferred
https://www.openssh.com/txt/release-9.6
x_transferred
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
x_transferred
https://www.terrapin-attack.com
x_transferred
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
x_transferred
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
x_transferred
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
x_transferred
https://github.com/warp-tech/russh/releases/tag/v0.40.2
x_transferred
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
x_transferred
https://www.openwall.com/lists/oss-security/2023/12/18/2
x_transferred
https://twitter.com/TrueSkrillor/status/1736774389725565005
x_transferred
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
x_transferred
https://github.com/paramiko/paramiko/issues/2337
x_transferred
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
x_transferred
https://news.ycombinator.com/item?id=38684904
x_transferred
https://news.ycombinator.com/item?id=38685286
x_transferred
http://www.openwall.com/lists/oss-security/2023/12/18/3
mailing-list
x_transferred
https://github.com/mwiede/jsch/issues/457
x_transferred
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
x_transferred
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
x_transferred
https://github.com/advisories/GHSA-45x7-px36-x8w8
x_transferred
https://security-tracker.debian.org/tracker/source-package/libssh2
x_transferred
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
x_transferred
https://security-tracker.debian.org/tracker/CVE-2023-48795
x_transferred
https://bugzilla.suse.com/show_bug.cgi?id=1217950
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
x_transferred
https://bugs.gentoo.org/920280
x_transferred
https://ubuntu.com/security/CVE-2023-48795
x_transferred
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
x_transferred
https://access.redhat.com/security/cve/cve-2023-48795
x_transferred
https://github.com/mwiede/jsch/pull/461
x_transferred
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
x_transferred
https://github.com/libssh2/libssh2/pull/1291
x_transferred
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
x_transferred
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
x_transferred
https://github.com/rapier1/hpn-ssh/releases
x_transferred
https://github.com/proftpd/proftpd/issues/456
x_transferred
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
x_transferred
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
x_transferred
https://oryx-embedded.com/download/#changelog
x_transferred
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
x_transferred
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
x_transferred
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
x_transferred
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
x_transferred
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
x_transferred
https://crates.io/crates/thrussh/versions
x_transferred
https://github.com/NixOS/nixpkgs/pull/275249
x_transferred
http://www.openwall.com/lists/oss-security/2023/12/19/5
mailing-list
x_transferred
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
x_transferred
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
x_transferred
http://www.openwall.com/lists/oss-security/2023/12/20/3
mailing-list
x_transferred
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
x_transferred
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
x_transferred
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
x_transferred
https://github.com/apache/mina-sshd/issues/445
x_transferred
https://github.com/hierynomus/sshj/issues/916
x_transferred
https://github.com/janmojzis/tinyssh/issues/81
x_transferred
https://www.openwall.com/lists/oss-security/2023/12/20/3
x_transferred
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
x_transferred
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
vendor-advisory
x_transferred
https://www.debian.org/security/2023/dsa-5586
vendor-advisory
x_transferred
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
x_transferred
https://www.theregister.com/2023/12/20/terrapin_attack_ssh
x_transferred
https://filezilla-project.org/versions.php
x_transferred
https://nova.app/releases/#v11.8
x_transferred
https://roumenpetrov.info/secsh/#news20231220
x_transferred
https://www.vandyke.com/products/securecrt/history.txt
x_transferred
https://help.panic.com/releasenotes/transmit5/
x_transferred
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
x_transferred
https://github.com/PowerShell/Win32-OpenSSH/issues/2189
x_transferred
https://winscp.net/eng/docs/history#6.2.2
x_transferred
https://www.bitvise.com/ssh-client-version-history#933
x_transferred
https://github.com/cyd01/KiTTY/issues/520
x_transferred
https://www.debian.org/security/2023/dsa-5588
vendor-advisory
x_transferred
https://github.com/ssh-mitm/ssh-mitm/issues/165
x_transferred
https://news.ycombinator.com/item?id=38732005
x_transferred
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
mailing-list
x_transferred
https://security.gentoo.org/glsa/202312-16
vendor-advisory
x_transferred
https://security.gentoo.org/glsa/202312-17
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
vendor-advisory
x_transferred
https://security.netapp.com/advisory/ntap-20240105-0004/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
vendor-advisory
x_transferred
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
vendor-advisory
x_transferred
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
mailing-list
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
vendor-advisory
x_transferred
https://support.apple.com/kb/HT214084
x_transferred
http://seclists.org/fulldisclosure/2024/Mar/21
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
mailing-list
x_transferred
http://www.openwall.com/lists/oss-security/2024/04/17/8
mailing-list
x_transferred
http://www.openwall.com/lists/oss-security/2024/03/06/3
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html
N/A
https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html
N/A
https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
N/A
Hyperlink: https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit
Resource: N/A
Hyperlink: https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability
Resource: N/A
Hyperlink: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Resource:
x_transferred
Hyperlink: https://matt.ucc.asn.au/dropbear/CHANGES
Resource:
x_transferred
Hyperlink: https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Resource:
x_transferred
Hyperlink: https://www.netsarang.com/en/xshell-update-history/
Resource:
x_transferred
Hyperlink: https://www.paramiko.org/changelog.html
Resource:
x_transferred
Hyperlink: https://www.openssh.com/openbsd.html
Resource:
x_transferred
Hyperlink: https://github.com/openssh/openssh-portable/commits/master
Resource:
x_transferred
Hyperlink: https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
Resource:
x_transferred
Hyperlink: https://www.bitvise.com/ssh-server-version-history
Resource:
x_transferred
Hyperlink: https://github.com/ronf/asyncssh/tags
Resource:
x_transferred
Hyperlink: https://gitlab.com/libssh/libssh-mirror/-/tags
Resource:
x_transferred
Hyperlink: https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
Resource:
x_transferred
Hyperlink: https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
Resource:
x_transferred
Hyperlink: https://www.openssh.com/txt/release-9.6
Resource:
x_transferred
Hyperlink: https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
Resource:
x_transferred
Hyperlink: https://www.terrapin-attack.com
Resource:
x_transferred
Hyperlink: https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
Resource:
x_transferred
Hyperlink: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
Resource:
x_transferred
Hyperlink: https://thorntech.com/cve-2023-48795-and-sftp-gateway/
Resource:
x_transferred
Hyperlink: https://github.com/warp-tech/russh/releases/tag/v0.40.2
Resource:
x_transferred
Hyperlink: https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
Resource:
x_transferred
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/18/2
Resource:
x_transferred
Hyperlink: https://twitter.com/TrueSkrillor/status/1736774389725565005
Resource:
x_transferred
Hyperlink: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
Resource:
x_transferred
Hyperlink: https://github.com/paramiko/paramiko/issues/2337
Resource:
x_transferred
Hyperlink: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
Resource:
x_transferred
Hyperlink: https://news.ycombinator.com/item?id=38684904
Resource:
x_transferred
Hyperlink: https://news.ycombinator.com/item?id=38685286
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/18/3
Resource:
mailing-list
x_transferred
Hyperlink: https://github.com/mwiede/jsch/issues/457
Resource:
x_transferred
Hyperlink: https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
Resource:
x_transferred
Hyperlink: https://github.com/erlang/otp/releases/tag/OTP-26.2.1
Resource:
x_transferred
Hyperlink: https://github.com/advisories/GHSA-45x7-px36-x8w8
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/source-package/libssh2
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2023-48795
Resource:
x_transferred
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=1217950
Resource:
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2254210
Resource:
x_transferred
Hyperlink: https://bugs.gentoo.org/920280
Resource:
x_transferred
Hyperlink: https://ubuntu.com/security/CVE-2023-48795
Resource:
x_transferred
Hyperlink: https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
Resource:
x_transferred
Hyperlink: https://access.redhat.com/security/cve/cve-2023-48795
Resource:
x_transferred
Hyperlink: https://github.com/mwiede/jsch/pull/461
Resource:
x_transferred
Hyperlink: https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
Resource:
x_transferred
Hyperlink: https://github.com/libssh2/libssh2/pull/1291
Resource:
x_transferred
Hyperlink: https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Resource:
x_transferred
Hyperlink: https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
Resource:
x_transferred
Hyperlink: https://github.com/rapier1/hpn-ssh/releases
Resource:
x_transferred
Hyperlink: https://github.com/proftpd/proftpd/issues/456
Resource:
x_transferred
Hyperlink: https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
Resource:
x_transferred
Hyperlink: https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
Resource:
x_transferred
Hyperlink: https://oryx-embedded.com/download/#changelog
Resource:
x_transferred
Hyperlink: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Resource:
x_transferred
Hyperlink: https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
Resource:
x_transferred
Hyperlink: https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
Resource:
x_transferred
Hyperlink: https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
Resource:
x_transferred
Hyperlink: https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
Resource:
x_transferred
Hyperlink: https://crates.io/crates/thrussh/versions
Resource:
x_transferred
Hyperlink: https://github.com/NixOS/nixpkgs/pull/275249
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/19/5
Resource:
mailing-list
x_transferred
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
Resource:
x_transferred
Hyperlink: https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/3
Resource:
mailing-list
x_transferred
Hyperlink: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
Resource:
x_transferred
Hyperlink: https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
Resource:
x_transferred
Hyperlink: https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
Resource:
x_transferred
Hyperlink: https://github.com/apache/mina-sshd/issues/445
Resource:
x_transferred
Hyperlink: https://github.com/hierynomus/sshj/issues/916
Resource:
x_transferred
Hyperlink: https://github.com/janmojzis/tinyssh/issues/81
Resource:
x_transferred
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/20/3
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
Resource:
x_transferred
Hyperlink: https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.debian.org/security/2023/dsa-5586
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
Resource:
x_transferred
Hyperlink: https://www.theregister.com/2023/12/20/terrapin_attack_ssh
Resource:
x_transferred
Hyperlink: https://filezilla-project.org/versions.php
Resource:
x_transferred
Hyperlink: https://nova.app/releases/#v11.8
Resource:
x_transferred
Hyperlink: https://roumenpetrov.info/secsh/#news20231220
Resource:
x_transferred
Hyperlink: https://www.vandyke.com/products/securecrt/history.txt
Resource:
x_transferred
Hyperlink: https://help.panic.com/releasenotes/transmit5/
Resource:
x_transferred
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
Resource:
x_transferred
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2189
Resource:
x_transferred
Hyperlink: https://winscp.net/eng/docs/history#6.2.2
Resource:
x_transferred
Hyperlink: https://www.bitvise.com/ssh-client-version-history#933
Resource:
x_transferred
Hyperlink: https://github.com/cyd01/KiTTY/issues/520
Resource:
x_transferred
Hyperlink: https://www.debian.org/security/2023/dsa-5588
Resource:
vendor-advisory
x_transferred
Hyperlink: https://github.com/ssh-mitm/ssh-mitm/issues/165
Resource:
x_transferred
Hyperlink: https://news.ycombinator.com/item?id=38732005
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
Resource:
mailing-list
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202312-16
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202312-17
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20240105-0004/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://support.apple.com/kb/HT214084
Resource:
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2024/Mar/21
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
Resource:
mailing-list
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/17/8
Resource:
mailing-list
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/06/3
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-354CWE-354 Improper Validation of Integrity Check Value
Type: CWE
CWE ID: CWE-354
Description: CWE-354 Improper Validation of Integrity Check Value
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:18 Dec, 2023 | 16:15
Updated At:04 Nov, 2025 | 22:15

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CPE Matches

OpenBSD
openbsd
>>openssh>>Versions before 9.6(exclusive)
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
putty
putty
>>putty>>Versions before 0.80(exclusive)
cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
filezilla-project
filezilla-project
>>filezilla_client>>Versions before 3.66.4(exclusive)
cpe:2.3:a:filezilla-project:filezilla_client:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>-
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
panic
panic
>>transmit_5>>Versions before 5.10.4(exclusive)
cpe:2.3:a:panic:transmit_5:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>-
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
panic
panic
>>nova>>Versions before 11.8(exclusive)
cpe:2.3:a:panic:nova:*:*:*:*:*:*:*:*
roumenpetrov
roumenpetrov
>>pkixssh>>Versions before 14.4(exclusive)
cpe:2.3:a:roumenpetrov:pkixssh:*:*:*:*:*:*:*:*
winscp
winscp
>>winscp>>Versions before 6.2.2(exclusive)
cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*
bitvise
bitvise
>>ssh_client>>Versions before 9.33(exclusive)
cpe:2.3:a:bitvise:ssh_client:*:*:*:*:*:*:*:*
bitvise
bitvise
>>ssh_server>>Versions before 9.32(exclusive)
cpe:2.3:a:bitvise:ssh_server:*:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos>>Versions up to 3.66.4(inclusive)
cpe:2.3:o:lancom-systems:lcos:*:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos_fx>>-
cpe:2.3:o:lancom-systems:lcos_fx:-:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos_lx>>-
cpe:2.3:o:lancom-systems:lcos_lx:-:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos_sx>>4.20
cpe:2.3:o:lancom-systems:lcos_sx:4.20:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos_sx>>5.20
cpe:2.3:o:lancom-systems:lcos_sx:5.20:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lanconfig>>-
cpe:2.3:o:lancom-systems:lanconfig:-:*:*:*:*:*:*:*
vandyke
vandyke
>>securecrt>>Versions before 9.4.3(exclusive)
cpe:2.3:a:vandyke:securecrt:*:*:*:*:*:*:*:*
libssh
libssh
>>libssh>>Versions before 0.10.6(exclusive)
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
net-ssh
net-ssh
>>net-ssh>>7.2.0
cpe:2.3:a:net-ssh:net-ssh:7.2.0:*:*:*:*:ruby:*:*
ssh2_project
ssh2_project
>>ssh2>>Versions up to 1.11.0(inclusive)
cpe:2.3:a:ssh2_project:ssh2:*:*:*:*:*:node.js:*:*
proftpd
proftpd
>>proftpd>>Versions up to 1.3.8b(inclusive)
cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>Versions up to 12.4(inclusive)
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
crates
crates
>>thrussh>>Versions before 0.35.1(exclusive)
cpe:2.3:a:crates:thrussh:*:*:*:*:*:*:*:*
tera_term_project
tera_term_project
>>tera_term>>Versions up to 5.1(inclusive)
cpe:2.3:a:tera_term_project:tera_term:*:*:*:*:*:*:*:*
oryx-embedded
oryx-embedded
>>cyclone_ssh>>Versions before 2.3.4(exclusive)
cpe:2.3:a:oryx-embedded:cyclone_ssh:*:*:*:*:*:*:*:*
crushftp
crushftp
>>crushftp>>Versions up to 10.6.0(inclusive)
cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
netsarang
netsarang
>>xshell_7>>Versions before build__0144(exclusive)
cpe:2.3:a:netsarang:xshell_7:*:*:*:*:*:*:*:*
paramiko
paramiko
>>paramiko>>Versions before 3.4.0(exclusive)
cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>4.0
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openstack_platform>>16.1
cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openstack_platform>>16.2
cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openstack_platform>>17.1
cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>ceph_storage>>6.0
cpe:2.3:a:redhat:ceph_storage:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>8.0
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>9.0
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_serverless>>-
cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_gitops>>-
cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_pipelines>>-
cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_developer_tools_and_services>>-
cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_data_foundation>>4.0
cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_api_for_data_protection>>-
cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_virtualization>>4
cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>storage>>3.0
cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>discovery>>-
cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_dev_spaces>>-
cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>cert-manager_operator_for_red_hat_openshift>>-
cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>keycloak>>-
cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>jboss_enterprise_application_platform>>7.0
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>single_sign-on>>7.0
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-354Primarynvd@nist.gov
CWE-354Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-354
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-354
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.htmlcve@mitre.org
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2024/Mar/21cve@mitre.org
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/18/3cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2023/12/19/5cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2023/12/20/3cve@mitre.org
Mailing List
Mitigation
http://www.openwall.com/lists/oss-security/2024/03/06/3cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2024/04/17/8cve@mitre.org
Mailing List
https://access.redhat.com/security/cve/cve-2023-48795cve@mitre.org
Third Party Advisory
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/cve@mitre.org
Press/Media Coverage
https://bugs.gentoo.org/920280cve@mitre.org
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2254210cve@mitre.org
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1217950cve@mitre.org
Issue Tracking
https://crates.io/crates/thrussh/versionscve@mitre.org
Release Notes
https://filezilla-project.org/versions.phpcve@mitre.org
Release Notes
https://forum.netgate.com/topic/184941/terrapin-ssh-attackcve@mitre.org
Issue Tracking
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6cve@mitre.org
Patch
https://github.com/NixOS/nixpkgs/pull/275249cve@mitre.org
Release Notes
https://github.com/PowerShell/Win32-OpenSSH/issues/2189cve@mitre.org
Issue Tracking
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Betacve@mitre.org
Release Notes
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0cve@mitre.org
Patch
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1cve@mitre.org
Release Notes
https://github.com/advisories/GHSA-45x7-px36-x8w8cve@mitre.org
Third Party Advisory
https://github.com/apache/mina-sshd/issues/445cve@mitre.org
Issue Tracking
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173abcve@mitre.org
Patch
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22cve@mitre.org
Third Party Advisory
https://github.com/cyd01/KiTTY/issues/520cve@mitre.org
Issue Tracking
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6cve@mitre.org
Release Notes
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42cve@mitre.org
Patch
https://github.com/erlang/otp/releases/tag/OTP-26.2.1cve@mitre.org
Release Notes
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05dcve@mitre.org
Patch
https://github.com/hierynomus/sshj/issues/916cve@mitre.org
Issue Tracking
https://github.com/janmojzis/tinyssh/issues/81cve@mitre.org
Issue Tracking
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5cve@mitre.org
Patch
https://github.com/libssh2/libssh2/pull/1291cve@mitre.org
Mitigation
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25cve@mitre.org
Patch
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3cve@mitre.org
Patch
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15cve@mitre.org
Product
https://github.com/mwiede/jsch/issues/457cve@mitre.org
Issue Tracking
https://github.com/mwiede/jsch/pull/461cve@mitre.org
Release Notes
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16cve@mitre.org
Patch
https://github.com/openssh/openssh-portable/commits/mastercve@mitre.org
Patch
https://github.com/paramiko/paramiko/issues/2337cve@mitre.org
Issue Tracking
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTEScve@mitre.org
Release Notes
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTEScve@mitre.org
Release Notes
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTEScve@mitre.org
Release Notes
https://github.com/proftpd/proftpd/issues/456cve@mitre.org
Issue Tracking
https://github.com/rapier1/hpn-ssh/releasescve@mitre.org
Release Notes
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rstcve@mitre.org
Release Notes
https://github.com/ronf/asyncssh/tagscve@mitre.org
Release Notes
https://github.com/ssh-mitm/ssh-mitm/issues/165cve@mitre.org
Issue Tracking
https://github.com/warp-tech/russh/releases/tag/v0.40.2cve@mitre.org
Release Notes
https://gitlab.com/libssh/libssh-mirror/-/tagscve@mitre.org
Release Notes
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQcve@mitre.org
Mailing List
https://groups.google.com/g/golang-announce/c/qA3XtxvMUygcve@mitre.org
Mailing List
https://help.panic.com/releasenotes/transmit5/cve@mitre.org
Release Notes
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/cve@mitre.org
Press/Media Coverage
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.htmlcve@mitre.org
Mailing List
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/cve@mitre.org
Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/cve@mitre.org
Mailing List
Third Party Advisory
https://matt.ucc.asn.au/dropbear/CHANGEScve@mitre.org
Release Notes
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQCcve@mitre.org
Patch
https://news.ycombinator.com/item?id=38684904cve@mitre.org
Issue Tracking
https://news.ycombinator.com/item?id=38685286cve@mitre.org
Issue Tracking
https://news.ycombinator.com/item?id=38732005cve@mitre.org
Issue Tracking
https://nova.app/releases/#v11.8cve@mitre.org
Release Notes
https://oryx-embedded.com/download/#changelogcve@mitre.org
Release Notes
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002cve@mitre.org
Third Party Advisory
https://roumenpetrov.info/secsh/#news20231220cve@mitre.org
Release Notes
https://security-tracker.debian.org/tracker/CVE-2023-48795cve@mitre.org
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/libssh2cve@mitre.org
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsgcve@mitre.org
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2cve@mitre.org
Issue Tracking
https://security.gentoo.org/glsa/202312-16cve@mitre.org
Third Party Advisory
https://security.gentoo.org/glsa/202312-17cve@mitre.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240105-0004/cve@mitre.org
Third Party Advisory
https://support.apple.com/kb/HT214084cve@mitre.org
Third Party Advisory
https://thorntech.com/cve-2023-48795-and-sftp-gateway/cve@mitre.org
Third Party Advisory
https://twitter.com/TrueSkrillor/status/1736774389725565005cve@mitre.org
Press/Media Coverage
https://ubuntu.com/security/CVE-2023-48795cve@mitre.org
Vendor Advisory
https://winscp.net/eng/docs/history#6.2.2cve@mitre.org
Release Notes
https://www.bitvise.com/ssh-client-version-history#933cve@mitre.org
Release Notes
https://www.bitvise.com/ssh-server-version-historycve@mitre.org
Release Notes
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.htmlcve@mitre.org
Release Notes
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Updatecve@mitre.org
Release Notes
https://www.debian.org/security/2023/dsa-5586cve@mitre.org
Issue Tracking
https://www.debian.org/security/2023/dsa-5588cve@mitre.org
Issue Tracking
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asccve@mitre.org
Release Notes
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508cve@mitre.org
Vendor Advisory
https://www.netsarang.com/en/xshell-update-history/cve@mitre.org
Release Notes
https://www.openssh.com/openbsd.htmlcve@mitre.org
Release Notes
https://www.openssh.com/txt/release-9.6cve@mitre.org
Release Notes
https://www.openwall.com/lists/oss-security/2023/12/18/2cve@mitre.org
Mailing List
https://www.openwall.com/lists/oss-security/2023/12/20/3cve@mitre.org
Mailing List
Mitigation
https://www.paramiko.org/changelog.htmlcve@mitre.org
Release Notes
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/cve@mitre.org
Issue Tracking
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/cve@mitre.org
Press/Media Coverage
https://www.terrapin-attack.comcve@mitre.org
Exploit
https://www.theregister.com/2023/12/20/terrapin_attack_sshcve@mitre.org
Press/Media Coverage
https://www.vandyke.com/products/securecrt/history.txtcve@mitre.org
Release Notes
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2024/Mar/21af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/18/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/12/19/5af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/12/20/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
Mitigation
http://www.openwall.com/lists/oss-security/2024/03/06/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/04/17/8af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://access.redhat.com/security/cve/cve-2023-48795af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://bugs.gentoo.org/920280af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2254210af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1217950af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://crates.io/crates/thrussh/versionsaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://filezilla-project.org/versions.phpaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://forum.netgate.com/topic/184941/terrapin-ssh-attackaf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/NixOS/nixpkgs/pull/275249af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/PowerShell/Win32-OpenSSH/issues/2189af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Betaaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/advisories/GHSA-45x7-px36-x8w8af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/apache/mina-sshd/issues/445af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173abaf854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/cyd01/KiTTY/issues/520af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/erlang/otp/releases/tag/OTP-26.2.1af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05daf854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/hierynomus/sshj/issues/916af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/janmojzis/tinyssh/issues/81af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/libssh2/libssh2/pull/1291af854a3a-2127-422b-91ae-364da2661108
Mitigation
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15af854a3a-2127-422b-91ae-364da2661108
Product
https://github.com/mwiede/jsch/issues/457af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/mwiede/jsch/pull/461af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/openssh/openssh-portable/commits/masteraf854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/paramiko/paramiko/issues/2337af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTESaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTESaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTESaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/proftpd/proftpd/issues/456af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/rapier1/hpn-ssh/releasesaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rstaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/ronf/asyncssh/tagsaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/ssh-mitm/ssh-mitm/issues/165af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/warp-tech/russh/releases/tag/v0.40.2af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://gitlab.com/libssh/libssh-mirror/-/tagsaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://groups.google.com/g/golang-announce/c/qA3XtxvMUygaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://help.panic.com/releasenotes/transmit5/af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/09/msg00042.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.debian.org/debian-lts-announce/2024/11/msg00032.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.debian.org/debian-lts-announce/2025/04/msg00028.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/af854a3a-2127-422b-91ae-364da2661108
N/A
https://matt.ucc.asn.au/dropbear/CHANGESaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQCaf854a3a-2127-422b-91ae-364da2661108
Patch
https://news.ycombinator.com/item?id=38684904af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://news.ycombinator.com/item?id=38685286af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://news.ycombinator.com/item?id=38732005af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://nova.app/releases/#v11.8af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://oryx-embedded.com/download/#changelogaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://roumenpetrov.info/secsh/#news20231220af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://security-tracker.debian.org/tracker/CVE-2023-48795af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/libssh2af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsgaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://security.gentoo.org/glsa/202312-16af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/202312-17af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240105-0004/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/kb/HT214084af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://thorntech.com/cve-2023-48795-and-sftp-gateway/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://twitter.com/TrueSkrillor/status/1736774389725565005af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://ubuntu.com/security/CVE-2023-48795af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://winscp.net/eng/docs/history#6.2.2af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.bitvise.com/ssh-client-version-history#933af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.bitvise.com/ssh-server-version-historyaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.htmlaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Updateaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.debian.org/security/2023/dsa-5586af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://www.debian.org/security/2023/dsa-5588af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.ascaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.netsarang.com/en/xshell-update-history/af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.openssh.com/openbsd.htmlaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.openssh.com/txt/release-9.6af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.openwall.com/lists/oss-security/2023/12/18/2af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.openwall.com/lists/oss-security/2023/12/20/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
Mitigation
https://www.paramiko.org/changelog.htmlaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://www.terrapin-attack.comaf854a3a-2127-422b-91ae-364da2661108
Exploit
https://www.theregister.com/2023/12/20/terrapin_attack_sshaf854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://www.vandyke.com/products/securecrt/history.txtaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilitaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerabilityaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2024/Mar/21
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/18/3
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/19/5
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/3
Source: cve@mitre.org
Resource:
Mailing List
Mitigation
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/06/3
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/17/8
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://access.redhat.com/security/cve/cve-2023-48795
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://bugs.gentoo.org/920280
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2254210
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=1217950
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://crates.io/crates/thrussh/versions
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://filezilla-project.org/versions.php
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/NixOS/nixpkgs/pull/275249
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2189
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/advisories/GHSA-45x7-px36-x8w8
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/apache/mina-sshd/issues/445
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/cyd01/KiTTY/issues/520
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/erlang/otp/releases/tag/OTP-26.2.1
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/hierynomus/sshj/issues/916
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/janmojzis/tinyssh/issues/81
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/libssh2/libssh2/pull/1291
Source: cve@mitre.org
Resource:
Mitigation
Hyperlink: https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://github.com/mwiede/jsch/issues/457
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/mwiede/jsch/pull/461
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/openssh/openssh-portable/commits/master
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/paramiko/paramiko/issues/2337
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/issues/456
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/rapier1/hpn-ssh/releases
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/ronf/asyncssh/tags
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/ssh-mitm/ssh-mitm/issues/165
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/warp-tech/russh/releases/tag/v0.40.2
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://gitlab.com/libssh/libssh-mirror/-/tags
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://help.panic.com/releasenotes/transmit5/
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://matt.ucc.asn.au/dropbear/CHANGES
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://news.ycombinator.com/item?id=38684904
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://news.ycombinator.com/item?id=38685286
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://news.ycombinator.com/item?id=38732005
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://nova.app/releases/#v11.8
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://oryx-embedded.com/download/#changelog
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://roumenpetrov.info/secsh/#news20231220
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2023-48795
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/libssh2
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://security.gentoo.org/glsa/202312-16
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202312-17
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240105-0004/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT214084
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://thorntech.com/cve-2023-48795-and-sftp-gateway/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://twitter.com/TrueSkrillor/status/1736774389725565005
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://ubuntu.com/security/CVE-2023-48795
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://winscp.net/eng/docs/history#6.2.2
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.bitvise.com/ssh-client-version-history#933
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.bitvise.com/ssh-server-version-history
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.debian.org/security/2023/dsa-5586
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://www.debian.org/security/2023/dsa-5588
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.netsarang.com/en/xshell-update-history/
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.openssh.com/openbsd.html
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.openssh.com/txt/release-9.6
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/18/2
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/20/3
Source: cve@mitre.org
Resource:
Mailing List
Mitigation
Hyperlink: https://www.paramiko.org/changelog.html
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://www.terrapin-attack.com
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: https://www.theregister.com/2023/12/20/terrapin_attack_ssh
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://www.vandyke.com/products/securecrt/history.txt
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2024/Mar/21
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/18/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/19/5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Mitigation
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/06/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/17/8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://access.redhat.com/security/cve/cve-2023-48795
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://bugs.gentoo.org/920280
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2254210
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=1217950
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://crates.io/crates/thrussh/versions
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://filezilla-project.org/versions.php
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/NixOS/nixpkgs/pull/275249
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2189
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/advisories/GHSA-45x7-px36-x8w8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://github.com/apache/mina-sshd/issues/445
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://github.com/cyd01/KiTTY/issues/520
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/erlang/otp/releases/tag/OTP-26.2.1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/hierynomus/sshj/issues/916
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/janmojzis/tinyssh/issues/81
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/libssh2/libssh2/pull/1291
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mitigation
Hyperlink: https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: https://github.com/mwiede/jsch/issues/457
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/mwiede/jsch/pull/461
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/openssh/openssh-portable/commits/master
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/paramiko/paramiko/issues/2337
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/issues/456
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/rapier1/hpn-ssh/releases
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/ronf/asyncssh/tags
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/ssh-mitm/ssh-mitm/issues/165
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/warp-tech/russh/releases/tag/v0.40.2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://gitlab.com/libssh/libssh-mirror/-/tags
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://help.panic.com/releasenotes/transmit5/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://matt.ucc.asn.au/dropbear/CHANGES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://news.ycombinator.com/item?id=38684904
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://news.ycombinator.com/item?id=38685286
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://news.ycombinator.com/item?id=38732005
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://nova.app/releases/#v11.8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://oryx-embedded.com/download/#changelog
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://roumenpetrov.info/secsh/#news20231220
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2023-48795
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/libssh2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://security.gentoo.org/glsa/202312-16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202312-17
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240105-0004/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT214084
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://thorntech.com/cve-2023-48795-and-sftp-gateway/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://twitter.com/TrueSkrillor/status/1736774389725565005
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://ubuntu.com/security/CVE-2023-48795
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://winscp.net/eng/docs/history#6.2.2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.bitvise.com/ssh-client-version-history#933
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.bitvise.com/ssh-server-version-history
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.debian.org/security/2023/dsa-5586
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://www.debian.org/security/2023/dsa-5588
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.netsarang.com/en/xshell-update-history/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.openssh.com/openbsd.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.openssh.com/txt/release-9.6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/18/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/20/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Mitigation
Hyperlink: https://www.paramiko.org/changelog.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://www.terrapin-attack.com
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: https://www.theregister.com/2023/12/20/terrapin_attack_ssh
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://www.vandyke.com/products/securecrt/history.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

74Records found

CVE-2024-41909
Matching Score-10
Assigner-Apache Software Foundation
ShareView Details
Matching Score-10
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.48% / 65.04%
||
7 Day CHG~0.00%
Published-12 Aug, 2024 | 16:00
Updated-27 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache MINA SSHD: integrity check bypass

Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack The mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected.

Action-Not Available
Vendor-The Apache Software Foundation
Product-mina_sshdApache MINA SSHD
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2017-11104
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-1.98% / 83.60%
||
7 Day CHG~0.00%
Published-08 Jul, 2017 | 10:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.

Action-Not Available
Vendor-knot-dnsn/aDebian GNU/Linux
Product-knot_dnsdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11841
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.40% / 60.59%
||
7 Day CHG~0.00%
Published-22 May, 2019 | 00:00
Updated-04 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A message-forgery issue was discovered in crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain one or more optional "Hash" Armor Headers. The "Hash" Armor Header specifies the message digest algorithm(s) used for the signature. However, the Go clearsign package ignores the value of this header, which allows an attacker to spoof it. Consequently, an attacker can lead a victim to believe the signature was generated using a different message digest algorithm than what was actually used. Moreover, since the library skips Armor Header parsing in general, an attacker can not only embed arbitrary Armor Headers, but also prepend arbitrary text to cleartext messages without invalidating the signatures.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGo
Product-cryptodebian_linuxn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2022-39264
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.38% / 59.56%
||
7 Day CHG~0.00%
Published-28 Sep, 2022 | 00:00
Updated-23 Apr, 2025 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
nheko vulnerable to secret poisoning using MITM on secret requests by the homeserver

nheko is a desktop client for the Matrix communication application. All versions below 0.10.2 are vulnerable homeservers inserting malicious secrets, which could lead to man-in-the-middle attacks. Users can upgrade to version 0.10.2 to protect against this issue. As a workaround, one may apply the patch manually, avoid doing verifications of one's own devices, and/or avoid pressing the request button in the settings menu.

Action-Not Available
Vendor-nheko-rebornNheko-RebornFedora Project
Product-nhekofedoranheko
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-295
Improper Certificate Validation
CVE-2008-4989
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.39% / 60.28%
||
7 Day CHG~0.00%
Published-13 Nov, 2008 | 00:00
Updated-07 Aug, 2024 | 10:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).

Action-Not Available
Vendor-n/aGNUSUSEDebian GNU/LinuxFedora ProjectopenSUSECanonical Ltd.
Product-ubuntu_linuxlinux_enterprise_serverdebian_linuxopensuselinux_enterprisefedoragnutlsn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-22947
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.25% / 48.71%
||
7 Day CHG~0.00%
Published-29 Sep, 2021 | 00:00
Updated-16 Apr, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

Action-Not Available
Vendor-n/aOracle CorporationApple Inc.Debian GNU/LinuxSplunk LLC (Cisco Systems, Inc.)NetApp, Inc.Fedora ProjectSiemens AGCURL
Product-h300ecurlh410s_firmwareh500scommunications_cloud_native_core_security_edge_protection_proxycommunications_cloud_native_core_consoledebian_linuxpeoplesoft_enterprise_peopletoolsuniversal_forwarderh300s_firmwaremysql_serverh700e_firmwaremacosh410sh500s_firmwarecommunications_cloud_native_core_service_communication_proxyh700s_firmwareh300e_firmwareh500eclustered_data_ontaph700eh700scommunications_cloud_native_core_binding_support_functioncommunications_cloud_native_core_network_repository_functionh300sh500e_firmwaresolidfire_baseboard_management_controller_firmwarecommerce_guided_searchcommunications_cloud_native_core_network_slice_selection_functionsinec_infrastructure_network_servicescommunications_cloud_native_core_network_function_cloud_native_environmentcloud_backupfedorasolidfire_baseboard_management_controllerhttps://github.com/curl/curl
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2021-22895
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.36% / 58.47%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 15:49
Updated-03 Aug, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nextcloud Desktop Client before 3.3.1 is vulnerable to improper certificate validation due to lack of SSL certificate verification when using the "Register with a Provider" flow.

Action-Not Available
Vendor-n/aDebian GNU/LinuxNextcloud GmbH
Product-desktopdebian_linuxNextcloud Desktop Client
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-41180
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.07% / 21.48%
||
7 Day CHG~0.00%
Published-03 Sep, 2023 | 15:52
Updated-27 Sep, 2024 | 18:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache NiFi MiNiFi C++: Incorrect Certificate Validation in InvokeHTTP for MiNiFi C++

Incorrect certificate validation in InvokeHTTP on Apache NiFi MiNiFi C++ versions 0.13 to 0.14 allows an intermediary to present a forged certificate during TLS handshake negotation. The Disable Peer Verification property of InvokeHTTP was effectively flipped, disabling verification by default, when using HTTPS. Mitigation: Set the Disable Peer Verification property of InvokeHTTP to true when using MiNiFi C++ versions 0.13.0 or 0.14.0. Upgrading to MiNiFi C++ 0.15.0 corrects the default behavior.

Action-Not Available
Vendor-The Apache Software Foundation
Product-nifi_minifi_c\+\+Apache NiFi MiNiFi C++
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-21295
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.39% / 60.15%
||
7 Day CHG~0.00%
Published-09 Mar, 2021 | 18:35
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Possible request smuggling in HTTP/2 due missing validation

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`.

Action-Not Available
Vendor-quarkusThe Netty ProjectNetApp, Inc.The Apache Software FoundationDebian GNU/LinuxOracle Corporation
Product-debian_linuxoncommand_api_servicesquarkusnettykuduzookeeperoncommand_workflow_automationcommunications_cloud_native_core_policyio.netty:netty-codec-http2
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2021-21409
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-2.55% / 85.50%
||
7 Day CHG~0.00%
Published-30 Mar, 2021 | 15:05
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Possible request smuggling in HTTP/2 due missing validation of content-length

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

Action-Not Available
Vendor-quarkusThe Netty ProjectNetApp, Inc.Debian GNU/LinuxOracle Corporation
Product-coherenceoncommand_api_servicescommunications_cloud_native_core_consolecommunications_messaging_serverquarkusprimavera_gatewayhelidononcommand_workflow_automationcommunications_cloud_native_core_policycommunications_brm_-_elastic_charging_enginebanking_trade_finance_process_managementdebian_linuxnettynosql_databasecommunications_design_studiobanking_corporate_lending_process_managementbanking_credit_facilities_process_managementjd_edwards_enterpriseone_toolsnetty
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2021-20251
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.22% / 44.87%
||
7 Day CHG~0.00%
Published-06 Mar, 2023 | 00:00
Updated-06 Mar, 2025 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.

Action-Not Available
Vendor-n/aFedora ProjectSamba
Product-fedorasambasamba
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-32531
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.80% / 74.07%
||
7 Day CHG~0.00%
Published-15 Dec, 2022 | 10:17
Updated-17 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache BookKeeper: Java Client Uses Connection to Host that Failed Hostname Verification

The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves the bookkeeper client vulnerable to a man in the middle attack. The problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1.

Action-Not Available
Vendor-The Apache Software Foundation
Product-bookkeeperApache BookKeeper
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-32427
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 29.02%
||
7 Day CHG~0.00%
Published-28 Jul, 2023 | 04:30
Updated-22 Oct, 2024 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed by using HTTPS when sending information over the network. This issue is fixed in Apple Music 4.2.0 for Android. An attacker in a privileged network position may be able to intercept network traffic.

Action-Not Available
Vendor-Apple Inc.
Product-musicApple Music for Android
CVE-2018-2973
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-0.25% / 48.47%
||
7 Day CHG+0.09%
Published-18 Jul, 2018 | 13:00
Updated-02 Oct, 2024 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-HP Inc.NetApp, Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_servervirtual_storage_consolexp7_command_viewcloud_backupactive_iq_unified_managersatellitejdkoncommand_workflow_automationsteelstore_cloud_integrated_storageplug-in_for_symantec_netbackupstorage_replication_adapter_for_clustered_data_ontapsnapmanagerjreenterprise_linux_workstatione-series_santricity_os_controllere-series_santricity_storage_managervasa_provider_for_clustered_data_ontaponcommand_unified_managerenterprise_linux_desktoponcommand_insightJava
CVE-2021-2161
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-1.40% / 80.48%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 21:53
Updated-26 Sep, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-Debian GNU/LinuxMcAfee, LLCNetApp, Inc.Fedora ProjectOracle Corporation
Product-debian_linuxopenjdkepolicy_orchestratorgraalvmhci_storage_nodejrehci_management_nodefedoraactive_iq_unified_managerjdkhci_compute_nodesolidfireJava SE JDK and JRE
CVE-2018-18506
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-5.9||MEDIUM
EPSS-2.36% / 84.95%
||
7 Day CHG~0.00%
Published-05 Feb, 2019 | 21:00
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Canonical Ltd.openSUSEMozilla Corporation
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_server_eusfirefoxenterprise_linux_server_ausenterprise_linux_workstationenterprise_linuxenterprise_linux_eusenterprise_linux_server_tusenterprise_linux_desktopleapFirefox
CVE-2024-23277
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.27% / 50.58%
||
7 Day CHG~0.00%
Published-08 Mar, 2024 | 01:35
Updated-02 Apr, 2026 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed with improved checks. This issue is fixed in iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4. An attacker in a privileged network position may be able to inject keystrokes by spoofing a keyboard.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osipad_osmacosmacOSiOS and iPadOS
CVE-2022-23278
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-5.9||MEDIUM
EPSS-2.71% / 85.94%
||
7 Day CHG~0.00%
Published-09 Mar, 2022 | 17:06
Updated-08 Jul, 2025 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Defender for Endpoint Spoofing Vulnerability

Microsoft Defender for Endpoint Spoofing Vulnerability

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationGoogle LLCLinux Kernel Organization, Inc
Product-windows_server_2016windows_serverwindows_server_2012defender_for_endpointdefender_for_endpoint_edr_sensorlinux_kernelandroidwindows_11macoswindows_10windows_server_2019Microsoft Defender for Endpoint for LinuxMicrosoft Defender for Endpoint for iOSMicrosoft Defender for Endpoint for MacMicrosoft Defender for Endpoint for AndroidMicrosoft Defender for Endpoint EDR sensorMicrosoft Defender for Endpoint for Windows
CVE-2024-54492
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.21% / 43.88%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 22:59
Updated-02 Apr, 2026 | 19:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed by using HTTPS when sending information over the network. This issue is fixed in iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, visionOS 2.2. An attacker in a privileged network position may be able to alter network traffic.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionosipadosmacosmacOSiOS and iPadOSiPadOSvisionOS
CVE-2018-1108
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.46% / 64.06%
||
7 Day CHG~0.00%
Published-21 May, 2018 | 21:00
Updated-05 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneldrivers
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2024-54494
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.21% / 43.70%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 22:58
Updated-02 Apr, 2026 | 19:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with additional validation. This issue is fixed in iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, macOS Sonoma 14.7.2, macOS Ventura 13.7.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. An attacker may be able to create a read-only memory mapping that can be written to.

Action-Not Available
Vendor-Apple Inc.
Product-tvosvisionoswatchosmacosiphone_osipadosvisionOSmacOStvOSiOS and iPadOSiPadOSwatchOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-2958
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-1.18% / 78.80%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 17:40
Updated-01 Oct, 2024 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-Debian GNU/LinuxNetApp, Inc.Oracle CorporationopenSUSE
Product-debian_linuxe-series_santricity_unified_managersnapmanagerjree-series_santricity_os_controllere-series_santricity_storage_managerjdke-series_santricity_web_services_proxyoncommand_workflow_automationleapJava
CVE-2022-21541
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-0.40% / 60.81%
||
7 Day CHG~0.00%
Published-19 Jul, 2022 | 00:00
Updated-23 Sep, 2024 | 19:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-azulDebian GNU/LinuxNetApp, Inc.Oracle CorporationFedora Project
Product-openjdkdebian_linuxgraalvmzulujrehci_management_nodefedora7-mode_transition_toolactive_iq_unified_managerjdkcloud_insights_acquisition_unitcloud_secure_agenthci_compute_nodesolidfireoncommand_insightJava SE JDK and JRE
CVE-2016-1252
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-5.9||MEDIUM
EPSS-5.96% / 90.66%
||
7 Day CHG~0.00%
Published-05 Dec, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxadvanced_package_tooln/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-0552
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.21% / 43.45%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:38
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the original fix for the netty-codec-http CVE-2021-21409, where the OpenShift Logging openshift-logging/elasticsearch6-rhel8 container was incomplete. The vulnerable netty-codec-http maven package was not removed from the image content. This flaw affects origin-aggregated-logging versions 3.11.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-origin-aggregated-loggingorigin-aggregated-logging/elasticsearch
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2017-6512
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.90% / 75.64%
||
7 Day CHG~0.00%
Published-01 Jun, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.

Action-Not Available
Vendor-file\n/aDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linux\debian_linuxn/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2026-24281
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 8.04%
||
7 Day CHG~0.00%
Published-07 Mar, 2026 | 08:50
Updated-10 Mar, 2026 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache ZooKeeper: Reverse-DNS fallback enables hostname verification bypass in ZooKeeper ZKTrustManager

Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.

Action-Not Available
Vendor-The Apache Software Foundation
Product-zookeeperApache ZooKeeper
CWE ID-CWE-295
Improper Certificate Validation
CWE ID-CWE-350
Reliance on Reverse DNS Resolution for a Security-Critical Action
CVE-2013-6673
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.55% / 67.83%
||
7 Day CHG~0.00%
Published-11 Dec, 2013 | 15:00
Updated-25 Nov, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.

Action-Not Available
Vendor-n/aMozilla CorporationCanonical Ltd.Fedora ProjectopenSUSESUSE
Product-suse_linux_enterprise_software_development_kitthunderbirdfedorafirefoxubuntu_linuxseamonkeylinux_enterprise_desktopopensuselinux_enterprise_servern/a
CVE-2021-30696
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.29% / 52.39%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 14:27
Updated-03 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An attacker in a privileged network position may be able to misrepresent application state. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A logic issue was addressed with improved state management.

Action-Not Available
Vendor-Apple Inc.
Product-macosmac_os_xmacOS
CVE-2013-5123
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-12.38% / 93.92%
||
7 Day CHG~0.00%
Published-05 Nov, 2019 | 21:16
Updated-06 Aug, 2024 | 17:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.

Action-Not Available
Vendor-virtualenvpypan/aDebian GNU/LinuxRed Hat, Inc.Fedora Project
Product-virtualenvdebian_linuxsoftware_collectionsopenshiftpipfedoran/a
CWE ID-CWE-287
Improper Authentication
CVE-2013-4584
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.58% / 68.92%
||
7 Day CHG~0.00%
Published-15 Nov, 2019 | 14:04
Updated-06 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Perdition before 2.2 may have weak security when handling outbound connections, caused by an error in the STARTTLS IMAP and POP server. ssl_outgoing_ciphers not being applied to STARTTLS connections

Action-Not Available
Vendor-hormsPerditionDebian GNU/Linux
Product-perditiondebian_linuxPerdition
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2013-2255
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.41% / 61.66%
||
7 Day CHG~0.00%
Published-01 Nov, 2019 | 18:38
Updated-06 Aug, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.

Action-Not Available
Vendor-Debian GNU/LinuxOpenStackRed Hat, Inc.
Product-keystonedebian_linuxopenstackcomputeKeystoneCompute
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-3049
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-1.03% / 77.38%
||
7 Day CHG~0.00%
Published-06 Jun, 2024 | 05:30
Updated-17 Mar, 2026 | 21:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Booth: specially crafted hash can lead to invalid hmac being accepted by booth server

A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.

Action-Not Available
Vendor-clusterlabsRed Hat, Inc.
Product-enterprise_linux_for_ibm_z_systemsenterprise_linux_eusenterprise_linux_for_power_little_endian_eusenterprise_linuxenterprise_linux_for_ibm_z_systems_eusenterprise_linux_for_arm_64enterprise_linux_server_update_services_for_sap_solutionsboothRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 8Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 10Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8.8 Extended Update Support
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-28867
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.50% / 65.97%
||
7 Day CHG~0.00%
Published-29 Mar, 2024 | 14:26
Updated-13 Jan, 2026 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Swift Prometheus un-sanitized metric name or labels can be used to take over exported metrics

Swift Prometheus is a Swift client for the Prometheus monitoring system, supporting counters, gauges and histograms. In code which applies _un-sanitized string values into metric names or labels_, an attacker could make use of this and send a `?lang` query parameter containing newlines, `}` or similar characters which can lead to the attacker taking over the exported format -- including creating unbounded numbers of stored metrics, inflating server memory usage, or causing "bogus" metrics. This vulnerability is fixed in2.0.0-alpha.2.

Action-Not Available
Vendor-swift-serverApple Inc.
Product-swift_prometheusswift-prometheus
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2024-27823
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.18% / 40.26%
||
7 Day CHG~0.00%
Published-29 Jul, 2024 | 22:16
Updated-02 Apr, 2026 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with improved locking. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, macOS Sonoma 14.5, macOS Ventura 13.6.7, tvOS 17.5, visionOS 1.3, watchOS 10.5. An attacker in a privileged network position may be able to spoof network packets.

Action-Not Available
Vendor-Apple Inc.
Product-tvosvisionoswatchosmacosiphone_osipadosvisionOSmacOStvOSiOS and iPadOSwatchOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2024-26578
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.29% / 52.52%
||
7 Day CHG~0.00%
Published-22 Feb, 2024 | 09:28
Updated-20 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Answer: Repeated submission at registration created duplicate users with the same name

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. Repeated submission during registration resulted in the registration of the same user. When users register, if they rapidly submit multiple registrations using scripts, it can result in the creation of multiple user accounts simultaneously with the same name. Users are recommended to upgrade to version [1.2.5], which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-answerApache Answer
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2024-23945
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-6.46% / 91.10%
||
7 Day CHG~0.00%
Published-23 Dec, 2024 | 15:26
Updated-14 Jul, 2025 | 18:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Hive, Apache Spark, Apache Spark: CookieSigner exposes the correct signature when message verification fails

Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation. The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following: * org.apache.hive:hive-service * org.apache.spark:spark-hive-thriftserver_2.11 * org.apache.spark:spark-hive-thriftserver_2.12

Action-Not Available
Vendor-The Apache Software Foundation
Product-hivesparkApache HiveApache Spark
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2011-0199
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.17% / 38.66%
||
7 Day CHG~0.00%
Published-24 Jun, 2011 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Certificate Trust Policy component in Apple Mac OS X before 10.6.8 does not perform CRL checking for Extended Validation (EV) certificates that lack OCSP URLs, which might allow man-in-the-middle attackers to spoof an SSL server via a revoked certificate.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xmac_os_x_servern/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-1726
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.16% / 37.21%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 19:45
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.

Action-Not Available
Vendor-libpod_projectTheRed Hat, Inc.
Product-libpodopenshift_container_platformenterprise_linuxpodman
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2023-7008
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.48% / 64.98%
||
7 Day CHG+0.04%
Published-23 Dec, 2023 | 13:00
Updated-06 Nov, 2025 | 21:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Systemd-resolved: unsigned name response in signed zone is not refused when dnssec=yes

A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.

Action-Not Available
Vendor-systemd_projectRed Hat, Inc.Debian GNU/Linux
Product-debian_linuxsystemdRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8Cryostat 2
CWE ID-CWE-300
Channel Accessible by Non-Endpoint
CVE-2020-14954
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-5.78% / 90.51%
||
7 Day CHG~0.00%
Published-21 Jun, 2020 | 16:55
Updated-04 Aug, 2024 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."

Action-Not Available
Vendor-neomuttmuttn/aCanonical Ltd.openSUSEFedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedoraneomuttmuttleapn/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2020-14928
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-6.35% / 91.02%
||
7 Day CHG~0.00%
Published-17 Jul, 2020 | 15:30
Updated-04 Aug, 2024 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxThe GNOME ProjectFedora Project
Product-ubuntu_linuxevolution-data-serverdebian_linuxfedoran/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2010-4532
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.23% / 46.01%
||
7 Day CHG~0.00%
Published-13 Nov, 2019 | 17:19
Updated-07 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks.

Action-Not Available
Vendor-offlineimapofflineimapDebian GNU/Linux
Product-offlineimapdebian_linuxofflineimap
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-2684
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-1.26% / 79.47%
||
7 Day CHG~0.00%
Published-23 Apr, 2019 | 18:16
Updated-02 Oct, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSEHP Inc.The Apache Software FoundationOracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxxp7_command_viewopenshift_container_platformenterprise_linux_server_ausenterprise_linuxsatellitejdkcassandradebian_linuxjreenterprise_linux_workstationenterprise_linux_eustomcatenterprise_linux_server_tusenterprise_linux_desktopleapJava
CVE-2019-7282
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.83% / 74.57%
||
7 Day CHG~0.00%
Published-31 Jan, 2019 | 18:00
Updated-04 Aug, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NetKit through 0.17, rcp.c in the rcp client allows remote rsh servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side. This is similar to CVE-2018-20685.

Action-Not Available
Vendor-netkitn/aDebian GNU/LinuxFedora Project
Product-netkitdebian_linuxfedoran/a
CVE-2019-6111
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-54.41% / 98.03%
||
7 Day CHG~0.00%
Published-31 Jan, 2019 | 00:00
Updated-18 Dec, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

Action-Not Available
Vendor-winscpn/aDebian GNU/LinuxFujitsu LimitedThe Apache Software FoundationFreeBSD FoundationSiemens AGRed Hat, Inc.Fedora ProjectCanonical Ltd.OpenBSD
Product-enterprise_linux_server_ausm10-4enterprise_linux_eusopensshm12-2s_firmwarem10-4_firmwarem10-4sm12-1_firmwareubuntu_linuxscalance_x204rna_eec_firmwaremina_sshdm12-1m12-2sm12-2_firmwarem10-4s_firmwareenterprise_linuxenterprise_linux_server_tusm12-2winscpfreebsddebian_linuxfedorascalance_x204rnam10-1_firmwarescalance_x204rna_eecscalance_x204rna_firmwarem10-1n/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-46445
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.49% / 65.48%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 00:00
Updated-25 Feb, 2026 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in AsyncSSH before 2.14.1 allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack, aka a "Rogue Extension Negotiation."

Action-Not Available
Vendor-asyncssh_projectn/a
Product-asyncsshn/a
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2019-25031
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.81% / 74.28%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 05:18
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unbound before 1.9.5 allows configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack against a cleartext HTTP session. NOTE: The vendor does not consider this a vulnerability of the Unbound software. create_unbound_ad_servers.sh is a contributed script from the community that facilitates automatic configuration creation. It is not part of the Unbound installation

Action-Not Available
Vendor-nlnetlabsn/aDebian GNU/Linux
Product-unbounddebian_linuxn/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2023-3347
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.42% / 61.92%
||
7 Day CHG~0.00%
Published-20 Jul, 2023 | 14:54
Updated-20 Nov, 2025 | 17:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Samba: smb2 packet signing is not enforced when "server signing = required" is set

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

Action-Not Available
Vendor-Red Hat, Inc.Fedora ProjectSamba
Product-storageenterprise_linuxfedorasambaRed Hat Enterprise Linux 9Red Hat Storage 3Red Hat Enterprise Linux 7Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
CVE-2023-24461
Matching Score-8
Assigner-F5, Inc.
ShareView Details
Matching Score-8
Assigner-F5, Inc.
CVSS Score-7.4||HIGH
EPSS-0.19% / 41.31%
||
7 Day CHG~0.00%
Published-03 May, 2023 | 14:31
Updated-29 Jan, 2025 | 21:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BIG-IP Edge Client for Windows and macOS vulnerability

An improper certificate validation vulnerability exists in the BIG-IP Edge Client for Windows and macOS and may allow an attacker to impersonate a BIG-IP APM system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationF5, Inc.
Product-windowsbig-ip_access_policy_managermacosBIG-IP Edge Client
CWE ID-CWE-295
Improper Certificate Validation
  • Previous
  • 1
  • 2
  • Next
Details not found