Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-48795

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-18 Dec, 2023 | 00:00
Updated At-04 Nov, 2025 | 22:05
Rejected At-
Credits

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:18 Dec, 2023 | 00:00
Updated At:04 Nov, 2025 | 22:05
Rejected At:
▼CVE Numbering Authority (CNA)

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
N/A
https://matt.ucc.asn.au/dropbear/CHANGES
N/A
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
N/A
https://www.netsarang.com/en/xshell-update-history/
N/A
https://www.paramiko.org/changelog.html
N/A
https://www.openssh.com/openbsd.html
N/A
https://github.com/openssh/openssh-portable/commits/master
N/A
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
N/A
https://www.bitvise.com/ssh-server-version-history
N/A
https://github.com/ronf/asyncssh/tags
N/A
https://gitlab.com/libssh/libssh-mirror/-/tags
N/A
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
N/A
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
N/A
https://www.openssh.com/txt/release-9.6
N/A
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
N/A
https://www.terrapin-attack.com
N/A
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
N/A
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
N/A
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
N/A
https://github.com/warp-tech/russh/releases/tag/v0.40.2
N/A
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
N/A
https://www.openwall.com/lists/oss-security/2023/12/18/2
N/A
https://twitter.com/TrueSkrillor/status/1736774389725565005
N/A
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
N/A
https://github.com/paramiko/paramiko/issues/2337
N/A
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
N/A
https://news.ycombinator.com/item?id=38684904
N/A
https://news.ycombinator.com/item?id=38685286
N/A
http://www.openwall.com/lists/oss-security/2023/12/18/3
mailing-list
https://github.com/mwiede/jsch/issues/457
N/A
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
N/A
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
N/A
https://github.com/advisories/GHSA-45x7-px36-x8w8
N/A
https://security-tracker.debian.org/tracker/source-package/libssh2
N/A
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
N/A
https://security-tracker.debian.org/tracker/CVE-2023-48795
N/A
https://bugzilla.suse.com/show_bug.cgi?id=1217950
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
N/A
https://bugs.gentoo.org/920280
N/A
https://ubuntu.com/security/CVE-2023-48795
N/A
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
N/A
https://access.redhat.com/security/cve/cve-2023-48795
N/A
https://github.com/mwiede/jsch/pull/461
N/A
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
N/A
https://github.com/libssh2/libssh2/pull/1291
N/A
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
N/A
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
N/A
https://github.com/rapier1/hpn-ssh/releases
N/A
https://github.com/proftpd/proftpd/issues/456
N/A
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
N/A
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
N/A
https://oryx-embedded.com/download/#changelog
N/A
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
N/A
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
N/A
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
N/A
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
N/A
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
N/A
https://crates.io/crates/thrussh/versions
N/A
https://github.com/NixOS/nixpkgs/pull/275249
N/A
http://www.openwall.com/lists/oss-security/2023/12/19/5
mailing-list
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
N/A
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
N/A
http://www.openwall.com/lists/oss-security/2023/12/20/3
mailing-list
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
N/A
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
N/A
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
N/A
https://github.com/apache/mina-sshd/issues/445
N/A
https://github.com/hierynomus/sshj/issues/916
N/A
https://github.com/janmojzis/tinyssh/issues/81
N/A
https://www.openwall.com/lists/oss-security/2023/12/20/3
N/A
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
N/A
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
vendor-advisory
https://www.debian.org/security/2023/dsa-5586
vendor-advisory
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
N/A
https://www.theregister.com/2023/12/20/terrapin_attack_ssh
N/A
https://filezilla-project.org/versions.php
N/A
https://nova.app/releases/#v11.8
N/A
https://roumenpetrov.info/secsh/#news20231220
N/A
https://www.vandyke.com/products/securecrt/history.txt
N/A
https://help.panic.com/releasenotes/transmit5/
N/A
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
N/A
https://github.com/PowerShell/Win32-OpenSSH/issues/2189
N/A
https://winscp.net/eng/docs/history#6.2.2
N/A
https://www.bitvise.com/ssh-client-version-history#933
N/A
https://github.com/cyd01/KiTTY/issues/520
N/A
https://www.debian.org/security/2023/dsa-5588
vendor-advisory
https://github.com/ssh-mitm/ssh-mitm/issues/165
N/A
https://news.ycombinator.com/item?id=38732005
N/A
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
mailing-list
https://security.gentoo.org/glsa/202312-16
vendor-advisory
https://security.gentoo.org/glsa/202312-17
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
vendor-advisory
https://security.netapp.com/advisory/ntap-20240105-0004/
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
vendor-advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
vendor-advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
mailing-list
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
mailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
vendor-advisory
https://support.apple.com/kb/HT214084
N/A
http://seclists.org/fulldisclosure/2024/Mar/21
mailing-list
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
mailing-list
http://www.openwall.com/lists/oss-security/2024/04/17/8
mailing-list
http://www.openwall.com/lists/oss-security/2024/03/06/3
mailing-list
Hyperlink: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Resource: N/A
Hyperlink: https://matt.ucc.asn.au/dropbear/CHANGES
Resource: N/A
Hyperlink: https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Resource: N/A
Hyperlink: https://www.netsarang.com/en/xshell-update-history/
Resource: N/A
Hyperlink: https://www.paramiko.org/changelog.html
Resource: N/A
Hyperlink: https://www.openssh.com/openbsd.html
Resource: N/A
Hyperlink: https://github.com/openssh/openssh-portable/commits/master
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
Resource: N/A
Hyperlink: https://www.bitvise.com/ssh-server-version-history
Resource: N/A
Hyperlink: https://github.com/ronf/asyncssh/tags
Resource: N/A
Hyperlink: https://gitlab.com/libssh/libssh-mirror/-/tags
Resource: N/A
Hyperlink: https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
Resource: N/A
Hyperlink: https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
Resource: N/A
Hyperlink: https://www.openssh.com/txt/release-9.6
Resource: N/A
Hyperlink: https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
Resource: N/A
Hyperlink: https://www.terrapin-attack.com
Resource: N/A
Hyperlink: https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
Resource: N/A
Hyperlink: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
Resource: N/A
Hyperlink: https://thorntech.com/cve-2023-48795-and-sftp-gateway/
Resource: N/A
Hyperlink: https://github.com/warp-tech/russh/releases/tag/v0.40.2
Resource: N/A
Hyperlink: https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
Resource: N/A
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/18/2
Resource: N/A
Hyperlink: https://twitter.com/TrueSkrillor/status/1736774389725565005
Resource: N/A
Hyperlink: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
Resource: N/A
Hyperlink: https://github.com/paramiko/paramiko/issues/2337
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
Resource: N/A
Hyperlink: https://news.ycombinator.com/item?id=38684904
Resource: N/A
Hyperlink: https://news.ycombinator.com/item?id=38685286
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/18/3
Resource:
mailing-list
Hyperlink: https://github.com/mwiede/jsch/issues/457
Resource: N/A
Hyperlink: https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
Resource: N/A
Hyperlink: https://github.com/erlang/otp/releases/tag/OTP-26.2.1
Resource: N/A
Hyperlink: https://github.com/advisories/GHSA-45x7-px36-x8w8
Resource: N/A
Hyperlink: https://security-tracker.debian.org/tracker/source-package/libssh2
Resource: N/A
Hyperlink: https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
Resource: N/A
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2023-48795
Resource: N/A
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=1217950
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2254210
Resource: N/A
Hyperlink: https://bugs.gentoo.org/920280
Resource: N/A
Hyperlink: https://ubuntu.com/security/CVE-2023-48795
Resource: N/A
Hyperlink: https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/cve-2023-48795
Resource: N/A
Hyperlink: https://github.com/mwiede/jsch/pull/461
Resource: N/A
Hyperlink: https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
Resource: N/A
Hyperlink: https://github.com/libssh2/libssh2/pull/1291
Resource: N/A
Hyperlink: https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Resource: N/A
Hyperlink: https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
Resource: N/A
Hyperlink: https://github.com/rapier1/hpn-ssh/releases
Resource: N/A
Hyperlink: https://github.com/proftpd/proftpd/issues/456
Resource: N/A
Hyperlink: https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
Resource: N/A
Hyperlink: https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
Resource: N/A
Hyperlink: https://oryx-embedded.com/download/#changelog
Resource: N/A
Hyperlink: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Resource: N/A
Hyperlink: https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
Resource: N/A
Hyperlink: https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
Resource: N/A
Hyperlink: https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
Resource: N/A
Hyperlink: https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
Resource: N/A
Hyperlink: https://crates.io/crates/thrussh/versions
Resource: N/A
Hyperlink: https://github.com/NixOS/nixpkgs/pull/275249
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/19/5
Resource:
mailing-list
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
Resource: N/A
Hyperlink: https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/3
Resource:
mailing-list
Hyperlink: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
Resource: N/A
Hyperlink: https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
Resource: N/A
Hyperlink: https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
Resource: N/A
Hyperlink: https://github.com/apache/mina-sshd/issues/445
Resource: N/A
Hyperlink: https://github.com/hierynomus/sshj/issues/916
Resource: N/A
Hyperlink: https://github.com/janmojzis/tinyssh/issues/81
Resource: N/A
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/20/3
Resource: N/A
Hyperlink: https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
Resource: N/A
Hyperlink: https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Resource:
vendor-advisory
Hyperlink: https://www.debian.org/security/2023/dsa-5586
Resource:
vendor-advisory
Hyperlink: https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
Resource: N/A
Hyperlink: https://www.theregister.com/2023/12/20/terrapin_attack_ssh
Resource: N/A
Hyperlink: https://filezilla-project.org/versions.php
Resource: N/A
Hyperlink: https://nova.app/releases/#v11.8
Resource: N/A
Hyperlink: https://roumenpetrov.info/secsh/#news20231220
Resource: N/A
Hyperlink: https://www.vandyke.com/products/securecrt/history.txt
Resource: N/A
Hyperlink: https://help.panic.com/releasenotes/transmit5/
Resource: N/A
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
Resource: N/A
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2189
Resource: N/A
Hyperlink: https://winscp.net/eng/docs/history#6.2.2
Resource: N/A
Hyperlink: https://www.bitvise.com/ssh-client-version-history#933
Resource: N/A
Hyperlink: https://github.com/cyd01/KiTTY/issues/520
Resource: N/A
Hyperlink: https://www.debian.org/security/2023/dsa-5588
Resource:
vendor-advisory
Hyperlink: https://github.com/ssh-mitm/ssh-mitm/issues/165
Resource: N/A
Hyperlink: https://news.ycombinator.com/item?id=38732005
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
Resource:
mailing-list
Hyperlink: https://security.gentoo.org/glsa/202312-16
Resource:
vendor-advisory
Hyperlink: https://security.gentoo.org/glsa/202312-17
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
Resource:
vendor-advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240105-0004/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Resource:
vendor-advisory
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Resource:
vendor-advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
Resource:
mailing-list
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
Resource:
mailing-list
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Resource:
vendor-advisory
Hyperlink: https://support.apple.com/kb/HT214084
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2024/Mar/21
Resource:
mailing-list
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
Resource:
mailing-list
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/17/8
Resource:
mailing-list
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/06/3
Resource:
mailing-list
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit
N/A
https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability
N/A
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
x_transferred
https://matt.ucc.asn.au/dropbear/CHANGES
x_transferred
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
x_transferred
https://www.netsarang.com/en/xshell-update-history/
x_transferred
https://www.paramiko.org/changelog.html
x_transferred
https://www.openssh.com/openbsd.html
x_transferred
https://github.com/openssh/openssh-portable/commits/master
x_transferred
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
x_transferred
https://www.bitvise.com/ssh-server-version-history
x_transferred
https://github.com/ronf/asyncssh/tags
x_transferred
https://gitlab.com/libssh/libssh-mirror/-/tags
x_transferred
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
x_transferred
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
x_transferred
https://www.openssh.com/txt/release-9.6
x_transferred
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
x_transferred
https://www.terrapin-attack.com
x_transferred
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
x_transferred
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
x_transferred
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
x_transferred
https://github.com/warp-tech/russh/releases/tag/v0.40.2
x_transferred
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
x_transferred
https://www.openwall.com/lists/oss-security/2023/12/18/2
x_transferred
https://twitter.com/TrueSkrillor/status/1736774389725565005
x_transferred
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
x_transferred
https://github.com/paramiko/paramiko/issues/2337
x_transferred
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
x_transferred
https://news.ycombinator.com/item?id=38684904
x_transferred
https://news.ycombinator.com/item?id=38685286
x_transferred
http://www.openwall.com/lists/oss-security/2023/12/18/3
mailing-list
x_transferred
https://github.com/mwiede/jsch/issues/457
x_transferred
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
x_transferred
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
x_transferred
https://github.com/advisories/GHSA-45x7-px36-x8w8
x_transferred
https://security-tracker.debian.org/tracker/source-package/libssh2
x_transferred
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
x_transferred
https://security-tracker.debian.org/tracker/CVE-2023-48795
x_transferred
https://bugzilla.suse.com/show_bug.cgi?id=1217950
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
x_transferred
https://bugs.gentoo.org/920280
x_transferred
https://ubuntu.com/security/CVE-2023-48795
x_transferred
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
x_transferred
https://access.redhat.com/security/cve/cve-2023-48795
x_transferred
https://github.com/mwiede/jsch/pull/461
x_transferred
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
x_transferred
https://github.com/libssh2/libssh2/pull/1291
x_transferred
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
x_transferred
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
x_transferred
https://github.com/rapier1/hpn-ssh/releases
x_transferred
https://github.com/proftpd/proftpd/issues/456
x_transferred
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
x_transferred
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
x_transferred
https://oryx-embedded.com/download/#changelog
x_transferred
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
x_transferred
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
x_transferred
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
x_transferred
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
x_transferred
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
x_transferred
https://crates.io/crates/thrussh/versions
x_transferred
https://github.com/NixOS/nixpkgs/pull/275249
x_transferred
http://www.openwall.com/lists/oss-security/2023/12/19/5
mailing-list
x_transferred
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
x_transferred
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
x_transferred
http://www.openwall.com/lists/oss-security/2023/12/20/3
mailing-list
x_transferred
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
x_transferred
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
x_transferred
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
x_transferred
https://github.com/apache/mina-sshd/issues/445
x_transferred
https://github.com/hierynomus/sshj/issues/916
x_transferred
https://github.com/janmojzis/tinyssh/issues/81
x_transferred
https://www.openwall.com/lists/oss-security/2023/12/20/3
x_transferred
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
x_transferred
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
vendor-advisory
x_transferred
https://www.debian.org/security/2023/dsa-5586
vendor-advisory
x_transferred
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
x_transferred
https://www.theregister.com/2023/12/20/terrapin_attack_ssh
x_transferred
https://filezilla-project.org/versions.php
x_transferred
https://nova.app/releases/#v11.8
x_transferred
https://roumenpetrov.info/secsh/#news20231220
x_transferred
https://www.vandyke.com/products/securecrt/history.txt
x_transferred
https://help.panic.com/releasenotes/transmit5/
x_transferred
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
x_transferred
https://github.com/PowerShell/Win32-OpenSSH/issues/2189
x_transferred
https://winscp.net/eng/docs/history#6.2.2
x_transferred
https://www.bitvise.com/ssh-client-version-history#933
x_transferred
https://github.com/cyd01/KiTTY/issues/520
x_transferred
https://www.debian.org/security/2023/dsa-5588
vendor-advisory
x_transferred
https://github.com/ssh-mitm/ssh-mitm/issues/165
x_transferred
https://news.ycombinator.com/item?id=38732005
x_transferred
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
mailing-list
x_transferred
https://security.gentoo.org/glsa/202312-16
vendor-advisory
x_transferred
https://security.gentoo.org/glsa/202312-17
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
vendor-advisory
x_transferred
https://security.netapp.com/advisory/ntap-20240105-0004/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
vendor-advisory
x_transferred
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
vendor-advisory
x_transferred
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
mailing-list
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
vendor-advisory
x_transferred
https://support.apple.com/kb/HT214084
x_transferred
http://seclists.org/fulldisclosure/2024/Mar/21
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
mailing-list
x_transferred
http://www.openwall.com/lists/oss-security/2024/04/17/8
mailing-list
x_transferred
http://www.openwall.com/lists/oss-security/2024/03/06/3
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html
N/A
https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html
N/A
https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
N/A
Hyperlink: https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit
Resource: N/A
Hyperlink: https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability
Resource: N/A
Hyperlink: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Resource:
x_transferred
Hyperlink: https://matt.ucc.asn.au/dropbear/CHANGES
Resource:
x_transferred
Hyperlink: https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Resource:
x_transferred
Hyperlink: https://www.netsarang.com/en/xshell-update-history/
Resource:
x_transferred
Hyperlink: https://www.paramiko.org/changelog.html
Resource:
x_transferred
Hyperlink: https://www.openssh.com/openbsd.html
Resource:
x_transferred
Hyperlink: https://github.com/openssh/openssh-portable/commits/master
Resource:
x_transferred
Hyperlink: https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
Resource:
x_transferred
Hyperlink: https://www.bitvise.com/ssh-server-version-history
Resource:
x_transferred
Hyperlink: https://github.com/ronf/asyncssh/tags
Resource:
x_transferred
Hyperlink: https://gitlab.com/libssh/libssh-mirror/-/tags
Resource:
x_transferred
Hyperlink: https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
Resource:
x_transferred
Hyperlink: https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
Resource:
x_transferred
Hyperlink: https://www.openssh.com/txt/release-9.6
Resource:
x_transferred
Hyperlink: https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
Resource:
x_transferred
Hyperlink: https://www.terrapin-attack.com
Resource:
x_transferred
Hyperlink: https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
Resource:
x_transferred
Hyperlink: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
Resource:
x_transferred
Hyperlink: https://thorntech.com/cve-2023-48795-and-sftp-gateway/
Resource:
x_transferred
Hyperlink: https://github.com/warp-tech/russh/releases/tag/v0.40.2
Resource:
x_transferred
Hyperlink: https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
Resource:
x_transferred
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/18/2
Resource:
x_transferred
Hyperlink: https://twitter.com/TrueSkrillor/status/1736774389725565005
Resource:
x_transferred
Hyperlink: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
Resource:
x_transferred
Hyperlink: https://github.com/paramiko/paramiko/issues/2337
Resource:
x_transferred
Hyperlink: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
Resource:
x_transferred
Hyperlink: https://news.ycombinator.com/item?id=38684904
Resource:
x_transferred
Hyperlink: https://news.ycombinator.com/item?id=38685286
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/18/3
Resource:
mailing-list
x_transferred
Hyperlink: https://github.com/mwiede/jsch/issues/457
Resource:
x_transferred
Hyperlink: https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
Resource:
x_transferred
Hyperlink: https://github.com/erlang/otp/releases/tag/OTP-26.2.1
Resource:
x_transferred
Hyperlink: https://github.com/advisories/GHSA-45x7-px36-x8w8
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/source-package/libssh2
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2023-48795
Resource:
x_transferred
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=1217950
Resource:
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2254210
Resource:
x_transferred
Hyperlink: https://bugs.gentoo.org/920280
Resource:
x_transferred
Hyperlink: https://ubuntu.com/security/CVE-2023-48795
Resource:
x_transferred
Hyperlink: https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
Resource:
x_transferred
Hyperlink: https://access.redhat.com/security/cve/cve-2023-48795
Resource:
x_transferred
Hyperlink: https://github.com/mwiede/jsch/pull/461
Resource:
x_transferred
Hyperlink: https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
Resource:
x_transferred
Hyperlink: https://github.com/libssh2/libssh2/pull/1291
Resource:
x_transferred
Hyperlink: https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Resource:
x_transferred
Hyperlink: https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
Resource:
x_transferred
Hyperlink: https://github.com/rapier1/hpn-ssh/releases
Resource:
x_transferred
Hyperlink: https://github.com/proftpd/proftpd/issues/456
Resource:
x_transferred
Hyperlink: https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
Resource:
x_transferred
Hyperlink: https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
Resource:
x_transferred
Hyperlink: https://oryx-embedded.com/download/#changelog
Resource:
x_transferred
Hyperlink: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Resource:
x_transferred
Hyperlink: https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
Resource:
x_transferred
Hyperlink: https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
Resource:
x_transferred
Hyperlink: https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
Resource:
x_transferred
Hyperlink: https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
Resource:
x_transferred
Hyperlink: https://crates.io/crates/thrussh/versions
Resource:
x_transferred
Hyperlink: https://github.com/NixOS/nixpkgs/pull/275249
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/19/5
Resource:
mailing-list
x_transferred
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
Resource:
x_transferred
Hyperlink: https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/3
Resource:
mailing-list
x_transferred
Hyperlink: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
Resource:
x_transferred
Hyperlink: https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
Resource:
x_transferred
Hyperlink: https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
Resource:
x_transferred
Hyperlink: https://github.com/apache/mina-sshd/issues/445
Resource:
x_transferred
Hyperlink: https://github.com/hierynomus/sshj/issues/916
Resource:
x_transferred
Hyperlink: https://github.com/janmojzis/tinyssh/issues/81
Resource:
x_transferred
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/20/3
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
Resource:
x_transferred
Hyperlink: https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.debian.org/security/2023/dsa-5586
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
Resource:
x_transferred
Hyperlink: https://www.theregister.com/2023/12/20/terrapin_attack_ssh
Resource:
x_transferred
Hyperlink: https://filezilla-project.org/versions.php
Resource:
x_transferred
Hyperlink: https://nova.app/releases/#v11.8
Resource:
x_transferred
Hyperlink: https://roumenpetrov.info/secsh/#news20231220
Resource:
x_transferred
Hyperlink: https://www.vandyke.com/products/securecrt/history.txt
Resource:
x_transferred
Hyperlink: https://help.panic.com/releasenotes/transmit5/
Resource:
x_transferred
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
Resource:
x_transferred
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2189
Resource:
x_transferred
Hyperlink: https://winscp.net/eng/docs/history#6.2.2
Resource:
x_transferred
Hyperlink: https://www.bitvise.com/ssh-client-version-history#933
Resource:
x_transferred
Hyperlink: https://github.com/cyd01/KiTTY/issues/520
Resource:
x_transferred
Hyperlink: https://www.debian.org/security/2023/dsa-5588
Resource:
vendor-advisory
x_transferred
Hyperlink: https://github.com/ssh-mitm/ssh-mitm/issues/165
Resource:
x_transferred
Hyperlink: https://news.ycombinator.com/item?id=38732005
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
Resource:
mailing-list
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202312-16
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202312-17
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20240105-0004/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://support.apple.com/kb/HT214084
Resource:
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2024/Mar/21
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
Resource:
mailing-list
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/17/8
Resource:
mailing-list
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/06/3
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-354CWE-354 Improper Validation of Integrity Check Value
Type: CWE
CWE ID: CWE-354
Description: CWE-354 Improper Validation of Integrity Check Value
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:18 Dec, 2023 | 16:15
Updated At:04 Nov, 2025 | 22:15

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CPE Matches

OpenBSD
openbsd
>>openssh>>Versions before 9.6(exclusive)
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
putty
putty
>>putty>>Versions before 0.80(exclusive)
cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
filezilla-project
filezilla-project
>>filezilla_client>>Versions before 3.66.4(exclusive)
cpe:2.3:a:filezilla-project:filezilla_client:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>-
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
panic
panic
>>transmit_5>>Versions before 5.10.4(exclusive)
cpe:2.3:a:panic:transmit_5:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>-
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
panic
panic
>>nova>>Versions before 11.8(exclusive)
cpe:2.3:a:panic:nova:*:*:*:*:*:*:*:*
roumenpetrov
roumenpetrov
>>pkixssh>>Versions before 14.4(exclusive)
cpe:2.3:a:roumenpetrov:pkixssh:*:*:*:*:*:*:*:*
winscp
winscp
>>winscp>>Versions before 6.2.2(exclusive)
cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*
bitvise
bitvise
>>ssh_client>>Versions before 9.33(exclusive)
cpe:2.3:a:bitvise:ssh_client:*:*:*:*:*:*:*:*
bitvise
bitvise
>>ssh_server>>Versions before 9.32(exclusive)
cpe:2.3:a:bitvise:ssh_server:*:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos>>Versions up to 3.66.4(inclusive)
cpe:2.3:o:lancom-systems:lcos:*:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos_fx>>-
cpe:2.3:o:lancom-systems:lcos_fx:-:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos_lx>>-
cpe:2.3:o:lancom-systems:lcos_lx:-:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos_sx>>4.20
cpe:2.3:o:lancom-systems:lcos_sx:4.20:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lcos_sx>>5.20
cpe:2.3:o:lancom-systems:lcos_sx:5.20:*:*:*:*:*:*:*
lancom-systems
lancom-systems
>>lanconfig>>-
cpe:2.3:o:lancom-systems:lanconfig:-:*:*:*:*:*:*:*
vandyke
vandyke
>>securecrt>>Versions before 9.4.3(exclusive)
cpe:2.3:a:vandyke:securecrt:*:*:*:*:*:*:*:*
libssh
libssh
>>libssh>>Versions before 0.10.6(exclusive)
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
net-ssh
net-ssh
>>net-ssh>>7.2.0
cpe:2.3:a:net-ssh:net-ssh:7.2.0:*:*:*:*:ruby:*:*
ssh2_project
ssh2_project
>>ssh2>>Versions up to 1.11.0(inclusive)
cpe:2.3:a:ssh2_project:ssh2:*:*:*:*:*:node.js:*:*
proftpd
proftpd
>>proftpd>>Versions up to 1.3.8b(inclusive)
cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>Versions up to 12.4(inclusive)
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
crates
crates
>>thrussh>>Versions before 0.35.1(exclusive)
cpe:2.3:a:crates:thrussh:*:*:*:*:*:*:*:*
tera_term_project
tera_term_project
>>tera_term>>Versions up to 5.1(inclusive)
cpe:2.3:a:tera_term_project:tera_term:*:*:*:*:*:*:*:*
oryx-embedded
oryx-embedded
>>cyclone_ssh>>Versions before 2.3.4(exclusive)
cpe:2.3:a:oryx-embedded:cyclone_ssh:*:*:*:*:*:*:*:*
crushftp
crushftp
>>crushftp>>Versions up to 10.6.0(inclusive)
cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
netsarang
netsarang
>>xshell_7>>Versions before build__0144(exclusive)
cpe:2.3:a:netsarang:xshell_7:*:*:*:*:*:*:*:*
paramiko
paramiko
>>paramiko>>Versions before 3.4.0(exclusive)
cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>4.0
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openstack_platform>>16.1
cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openstack_platform>>16.2
cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openstack_platform>>17.1
cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>ceph_storage>>6.0
cpe:2.3:a:redhat:ceph_storage:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>8.0
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>9.0
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_serverless>>-
cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_gitops>>-
cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_pipelines>>-
cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_developer_tools_and_services>>-
cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_data_foundation>>4.0
cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_api_for_data_protection>>-
cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_virtualization>>4
cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>storage>>3.0
cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>discovery>>-
cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_dev_spaces>>-
cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>cert-manager_operator_for_red_hat_openshift>>-
cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>keycloak>>-
cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>jboss_enterprise_application_platform>>7.0
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>single_sign-on>>7.0
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-354Primarynvd@nist.gov
CWE-354Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-354
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-354
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.htmlcve@mitre.org
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2024/Mar/21cve@mitre.org
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/18/3cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2023/12/19/5cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2023/12/20/3cve@mitre.org
Mailing List
Mitigation
http://www.openwall.com/lists/oss-security/2024/03/06/3cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2024/04/17/8cve@mitre.org
Mailing List
https://access.redhat.com/security/cve/cve-2023-48795cve@mitre.org
Third Party Advisory
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/cve@mitre.org
Press/Media Coverage
https://bugs.gentoo.org/920280cve@mitre.org
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2254210cve@mitre.org
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1217950cve@mitre.org
Issue Tracking
https://crates.io/crates/thrussh/versionscve@mitre.org
Release Notes
https://filezilla-project.org/versions.phpcve@mitre.org
Release Notes
https://forum.netgate.com/topic/184941/terrapin-ssh-attackcve@mitre.org
Issue Tracking
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6cve@mitre.org
Patch
https://github.com/NixOS/nixpkgs/pull/275249cve@mitre.org
Release Notes
https://github.com/PowerShell/Win32-OpenSSH/issues/2189cve@mitre.org
Issue Tracking
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Betacve@mitre.org
Release Notes
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0cve@mitre.org
Patch
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1cve@mitre.org
Release Notes
https://github.com/advisories/GHSA-45x7-px36-x8w8cve@mitre.org
Third Party Advisory
https://github.com/apache/mina-sshd/issues/445cve@mitre.org
Issue Tracking
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173abcve@mitre.org
Patch
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22cve@mitre.org
Third Party Advisory
https://github.com/cyd01/KiTTY/issues/520cve@mitre.org
Issue Tracking
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6cve@mitre.org
Release Notes
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42cve@mitre.org
Patch
https://github.com/erlang/otp/releases/tag/OTP-26.2.1cve@mitre.org
Release Notes
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05dcve@mitre.org
Patch
https://github.com/hierynomus/sshj/issues/916cve@mitre.org
Issue Tracking
https://github.com/janmojzis/tinyssh/issues/81cve@mitre.org
Issue Tracking
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5cve@mitre.org
Patch
https://github.com/libssh2/libssh2/pull/1291cve@mitre.org
Mitigation
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25cve@mitre.org
Patch
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3cve@mitre.org
Patch
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15cve@mitre.org
Product
https://github.com/mwiede/jsch/issues/457cve@mitre.org
Issue Tracking
https://github.com/mwiede/jsch/pull/461cve@mitre.org
Release Notes
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16cve@mitre.org
Patch
https://github.com/openssh/openssh-portable/commits/mastercve@mitre.org
Patch
https://github.com/paramiko/paramiko/issues/2337cve@mitre.org
Issue Tracking
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTEScve@mitre.org
Release Notes
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTEScve@mitre.org
Release Notes
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTEScve@mitre.org
Release Notes
https://github.com/proftpd/proftpd/issues/456cve@mitre.org
Issue Tracking
https://github.com/rapier1/hpn-ssh/releasescve@mitre.org
Release Notes
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rstcve@mitre.org
Release Notes
https://github.com/ronf/asyncssh/tagscve@mitre.org
Release Notes
https://github.com/ssh-mitm/ssh-mitm/issues/165cve@mitre.org
Issue Tracking
https://github.com/warp-tech/russh/releases/tag/v0.40.2cve@mitre.org
Release Notes
https://gitlab.com/libssh/libssh-mirror/-/tagscve@mitre.org
Release Notes
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQcve@mitre.org
Mailing List
https://groups.google.com/g/golang-announce/c/qA3XtxvMUygcve@mitre.org
Mailing List
https://help.panic.com/releasenotes/transmit5/cve@mitre.org
Release Notes
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/cve@mitre.org
Press/Media Coverage
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.htmlcve@mitre.org
Mailing List
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/cve@mitre.org
Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/cve@mitre.org
Mailing List
Third Party Advisory
https://matt.ucc.asn.au/dropbear/CHANGEScve@mitre.org
Release Notes
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQCcve@mitre.org
Patch
https://news.ycombinator.com/item?id=38684904cve@mitre.org
Issue Tracking
https://news.ycombinator.com/item?id=38685286cve@mitre.org
Issue Tracking
https://news.ycombinator.com/item?id=38732005cve@mitre.org
Issue Tracking
https://nova.app/releases/#v11.8cve@mitre.org
Release Notes
https://oryx-embedded.com/download/#changelogcve@mitre.org
Release Notes
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002cve@mitre.org
Third Party Advisory
https://roumenpetrov.info/secsh/#news20231220cve@mitre.org
Release Notes
https://security-tracker.debian.org/tracker/CVE-2023-48795cve@mitre.org
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/libssh2cve@mitre.org
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsgcve@mitre.org
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2cve@mitre.org
Issue Tracking
https://security.gentoo.org/glsa/202312-16cve@mitre.org
Third Party Advisory
https://security.gentoo.org/glsa/202312-17cve@mitre.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240105-0004/cve@mitre.org
Third Party Advisory
https://support.apple.com/kb/HT214084cve@mitre.org
Third Party Advisory
https://thorntech.com/cve-2023-48795-and-sftp-gateway/cve@mitre.org
Third Party Advisory
https://twitter.com/TrueSkrillor/status/1736774389725565005cve@mitre.org
Press/Media Coverage
https://ubuntu.com/security/CVE-2023-48795cve@mitre.org
Vendor Advisory
https://winscp.net/eng/docs/history#6.2.2cve@mitre.org
Release Notes
https://www.bitvise.com/ssh-client-version-history#933cve@mitre.org
Release Notes
https://www.bitvise.com/ssh-server-version-historycve@mitre.org
Release Notes
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.htmlcve@mitre.org
Release Notes
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Updatecve@mitre.org
Release Notes
https://www.debian.org/security/2023/dsa-5586cve@mitre.org
Issue Tracking
https://www.debian.org/security/2023/dsa-5588cve@mitre.org
Issue Tracking
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asccve@mitre.org
Release Notes
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508cve@mitre.org
Vendor Advisory
https://www.netsarang.com/en/xshell-update-history/cve@mitre.org
Release Notes
https://www.openssh.com/openbsd.htmlcve@mitre.org
Release Notes
https://www.openssh.com/txt/release-9.6cve@mitre.org
Release Notes
https://www.openwall.com/lists/oss-security/2023/12/18/2cve@mitre.org
Mailing List
https://www.openwall.com/lists/oss-security/2023/12/20/3cve@mitre.org
Mailing List
Mitigation
https://www.paramiko.org/changelog.htmlcve@mitre.org
Release Notes
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/cve@mitre.org
Issue Tracking
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/cve@mitre.org
Press/Media Coverage
https://www.terrapin-attack.comcve@mitre.org
Exploit
https://www.theregister.com/2023/12/20/terrapin_attack_sshcve@mitre.org
Press/Media Coverage
https://www.vandyke.com/products/securecrt/history.txtcve@mitre.org
Release Notes
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2024/Mar/21af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/18/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/12/19/5af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/12/20/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
Mitigation
http://www.openwall.com/lists/oss-security/2024/03/06/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/04/17/8af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://access.redhat.com/security/cve/cve-2023-48795af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://bugs.gentoo.org/920280af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2254210af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1217950af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://crates.io/crates/thrussh/versionsaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://filezilla-project.org/versions.phpaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://forum.netgate.com/topic/184941/terrapin-ssh-attackaf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/NixOS/nixpkgs/pull/275249af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/PowerShell/Win32-OpenSSH/issues/2189af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Betaaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/advisories/GHSA-45x7-px36-x8w8af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/apache/mina-sshd/issues/445af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173abaf854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/cyd01/KiTTY/issues/520af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/erlang/otp/releases/tag/OTP-26.2.1af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05daf854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/hierynomus/sshj/issues/916af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/janmojzis/tinyssh/issues/81af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/libssh2/libssh2/pull/1291af854a3a-2127-422b-91ae-364da2661108
Mitigation
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15af854a3a-2127-422b-91ae-364da2661108
Product
https://github.com/mwiede/jsch/issues/457af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/mwiede/jsch/pull/461af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/openssh/openssh-portable/commits/masteraf854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/paramiko/paramiko/issues/2337af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTESaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTESaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTESaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/proftpd/proftpd/issues/456af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/rapier1/hpn-ssh/releasesaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rstaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/ronf/asyncssh/tagsaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/ssh-mitm/ssh-mitm/issues/165af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/warp-tech/russh/releases/tag/v0.40.2af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://gitlab.com/libssh/libssh-mirror/-/tagsaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://groups.google.com/g/golang-announce/c/qA3XtxvMUygaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://help.panic.com/releasenotes/transmit5/af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/09/msg00042.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.debian.org/debian-lts-announce/2024/11/msg00032.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.debian.org/debian-lts-announce/2025/04/msg00028.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/af854a3a-2127-422b-91ae-364da2661108
N/A
https://matt.ucc.asn.au/dropbear/CHANGESaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQCaf854a3a-2127-422b-91ae-364da2661108
Patch
https://news.ycombinator.com/item?id=38684904af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://news.ycombinator.com/item?id=38685286af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://news.ycombinator.com/item?id=38732005af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://nova.app/releases/#v11.8af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://oryx-embedded.com/download/#changelogaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://roumenpetrov.info/secsh/#news20231220af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://security-tracker.debian.org/tracker/CVE-2023-48795af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/libssh2af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsgaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://security.gentoo.org/glsa/202312-16af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/202312-17af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240105-0004/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/kb/HT214084af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://thorntech.com/cve-2023-48795-and-sftp-gateway/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://twitter.com/TrueSkrillor/status/1736774389725565005af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://ubuntu.com/security/CVE-2023-48795af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://winscp.net/eng/docs/history#6.2.2af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.bitvise.com/ssh-client-version-history#933af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.bitvise.com/ssh-server-version-historyaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.htmlaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Updateaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.debian.org/security/2023/dsa-5586af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://www.debian.org/security/2023/dsa-5588af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.ascaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.netsarang.com/en/xshell-update-history/af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.openssh.com/openbsd.htmlaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.openssh.com/txt/release-9.6af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.openwall.com/lists/oss-security/2023/12/18/2af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.openwall.com/lists/oss-security/2023/12/20/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
Mitigation
https://www.paramiko.org/changelog.htmlaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://www.terrapin-attack.comaf854a3a-2127-422b-91ae-364da2661108
Exploit
https://www.theregister.com/2023/12/20/terrapin_attack_sshaf854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://www.vandyke.com/products/securecrt/history.txtaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilitaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerabilityaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2024/Mar/21
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/18/3
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/19/5
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/3
Source: cve@mitre.org
Resource:
Mailing List
Mitigation
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/06/3
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/17/8
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://access.redhat.com/security/cve/cve-2023-48795
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://bugs.gentoo.org/920280
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2254210
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=1217950
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://crates.io/crates/thrussh/versions
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://filezilla-project.org/versions.php
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/NixOS/nixpkgs/pull/275249
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2189
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/advisories/GHSA-45x7-px36-x8w8
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/apache/mina-sshd/issues/445
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/cyd01/KiTTY/issues/520
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/erlang/otp/releases/tag/OTP-26.2.1
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/hierynomus/sshj/issues/916
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/janmojzis/tinyssh/issues/81
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/libssh2/libssh2/pull/1291
Source: cve@mitre.org
Resource:
Mitigation
Hyperlink: https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://github.com/mwiede/jsch/issues/457
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/mwiede/jsch/pull/461
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/openssh/openssh-portable/commits/master
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/paramiko/paramiko/issues/2337
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/issues/456
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/rapier1/hpn-ssh/releases
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/ronf/asyncssh/tags
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://github.com/ssh-mitm/ssh-mitm/issues/165
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/warp-tech/russh/releases/tag/v0.40.2
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://gitlab.com/libssh/libssh-mirror/-/tags
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://help.panic.com/releasenotes/transmit5/
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://matt.ucc.asn.au/dropbear/CHANGES
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://news.ycombinator.com/item?id=38684904
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://news.ycombinator.com/item?id=38685286
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://news.ycombinator.com/item?id=38732005
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://nova.app/releases/#v11.8
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://oryx-embedded.com/download/#changelog
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://roumenpetrov.info/secsh/#news20231220
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2023-48795
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/libssh2
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://security.gentoo.org/glsa/202312-16
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202312-17
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240105-0004/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT214084
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://thorntech.com/cve-2023-48795-and-sftp-gateway/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://twitter.com/TrueSkrillor/status/1736774389725565005
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://ubuntu.com/security/CVE-2023-48795
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://winscp.net/eng/docs/history#6.2.2
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.bitvise.com/ssh-client-version-history#933
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.bitvise.com/ssh-server-version-history
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.debian.org/security/2023/dsa-5586
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://www.debian.org/security/2023/dsa-5588
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.netsarang.com/en/xshell-update-history/
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.openssh.com/openbsd.html
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.openssh.com/txt/release-9.6
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/18/2
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/20/3
Source: cve@mitre.org
Resource:
Mailing List
Mitigation
Hyperlink: https://www.paramiko.org/changelog.html
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://www.terrapin-attack.com
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: https://www.theregister.com/2023/12/20/terrapin_attack_ssh
Source: cve@mitre.org
Resource:
Press/Media Coverage
Hyperlink: https://www.vandyke.com/products/securecrt/history.txt
Source: cve@mitre.org
Resource:
Release Notes
Hyperlink: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2024/Mar/21
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/18/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/19/5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Mitigation
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/06/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/17/8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://access.redhat.com/security/cve/cve-2023-48795
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://bugs.gentoo.org/920280
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2254210
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=1217950
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://crates.io/crates/thrussh/versions
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://filezilla-project.org/versions.php
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/NixOS/nixpkgs/pull/275249
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2189
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/advisories/GHSA-45x7-px36-x8w8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://github.com/apache/mina-sshd/issues/445
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://github.com/cyd01/KiTTY/issues/520
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/erlang/otp/releases/tag/OTP-26.2.1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/hierynomus/sshj/issues/916
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/janmojzis/tinyssh/issues/81
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/libssh2/libssh2/pull/1291
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mitigation
Hyperlink: https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: https://github.com/mwiede/jsch/issues/457
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/mwiede/jsch/pull/461
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/openssh/openssh-portable/commits/master
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/paramiko/paramiko/issues/2337
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/proftpd/proftpd/issues/456
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/rapier1/hpn-ssh/releases
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/ronf/asyncssh/tags
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/ssh-mitm/ssh-mitm/issues/165
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/warp-tech/russh/releases/tag/v0.40.2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://gitlab.com/libssh/libssh-mirror/-/tags
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://help.panic.com/releasenotes/transmit5/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://matt.ucc.asn.au/dropbear/CHANGES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://news.ycombinator.com/item?id=38684904
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://news.ycombinator.com/item?id=38685286
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://news.ycombinator.com/item?id=38732005
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://nova.app/releases/#v11.8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://oryx-embedded.com/download/#changelog
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://roumenpetrov.info/secsh/#news20231220
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2023-48795
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/libssh2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://security.gentoo.org/glsa/202312-16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202312-17
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240105-0004/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT214084
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://thorntech.com/cve-2023-48795-and-sftp-gateway/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://twitter.com/TrueSkrillor/status/1736774389725565005
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://ubuntu.com/security/CVE-2023-48795
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://winscp.net/eng/docs/history#6.2.2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.bitvise.com/ssh-client-version-history#933
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.bitvise.com/ssh-server-version-history
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.debian.org/security/2023/dsa-5586
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://www.debian.org/security/2023/dsa-5588
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.netsarang.com/en/xshell-update-history/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.openssh.com/openbsd.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.openssh.com/txt/release-9.6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/18/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://www.openwall.com/lists/oss-security/2023/12/20/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Mitigation
Hyperlink: https://www.paramiko.org/changelog.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://www.terrapin-attack.com
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: https://www.theregister.com/2023/12/20/terrapin_attack_ssh
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: https://www.vandyke.com/products/securecrt/history.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

74Records found

CVE-2009-2408
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-1.85% / 83.05%
||
7 Day CHG-0.65%
Published-30 Jul, 2009 | 19:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.

Action-Not Available
Vendor-n/aSUSEDebian GNU/LinuxMozilla CorporationopenSUSECanonical Ltd.
Product-ubuntu_linuxlinux_enterprise_serverthunderbirddebian_linuxfirefoxopensusenetwork_security_serviceslinux_enterpriseseamonkeyn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-22372
Matching Score-8
Assigner-F5, Inc.
ShareView Details
Matching Score-8
Assigner-F5, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.28% / 51.28%
||
7 Day CHG~0.00%
Published-03 May, 2023 | 14:30
Updated-29 Jan, 2025 | 21:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BIG-IP Edge Client for Windows and Mac OS vulnerability

In the pre connection stage, an improper enforcement of message integrity vulnerability exists in BIG-IP Edge Client for Windows and Mac OS.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationF5, Inc.
Product-windowsbig-ip_access_policy_managermacosBIG-IP Edge Client
CWE ID-CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
CVE-2023-31147
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.09% / 25.95%
||
7 Day CHG~0.00%
Published-25 May, 2023 | 21:55
Updated-13 Feb, 2025 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient randomness in generation of DNS query IDs in c-ares

c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.

Action-Not Available
Vendor-c-ares_projectc-aresFedora Project
Product-fedorac-aresc-ares
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-28321
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.30% / 53.06%
||
7 Day CHG~0.00%
Published-26 May, 2023 | 00:00
Updated-15 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

Action-Not Available
Vendor-n/aNetApp, Inc.Debian GNU/LinuxApple Inc.CURLFedora Project
Product-macosfedorah410s_firmwareh410scurlh500s_firmwaredebian_linuxh700s_firmwareontap_antivirus_connectorh500sh300s_firmwareclustered_data_ontaph700sh300shttps://github.com/curl/curl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2015-3152
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-51.67% / 97.91%
||
7 Day CHG~0.00%
Published-16 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.

Action-Not Available
Vendor-n/aMariaDB FoundationRed Hat, Inc.Fedora ProjectThe PHP GroupDebian GNU/LinuxOracle Corporation
Product-enterprise_linux_serverenterprise_linux_server_ausmysql_connector\/centerprise_linux_eusfedoramariadbmysqlenterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationphpdebian_linuxn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2015-1855
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-2.72% / 85.96%
||
7 Day CHG~0.00%
Published-29 Nov, 2019 | 20:46
Updated-06 Aug, 2024 | 04:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.

Action-Not Available
Vendor-RubyPerforce Software, Inc. ("Puppet")Debian GNU/Linux
Product-puppet_agenttrunkdebian_linuxrubypuppet_enterpriseRuby
CWE ID-CWE-20
Improper Input Validation
CVE-2014-8167
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.27% / 50.33%
||
7 Day CHG+0.10%
Published-13 Nov, 2019 | 16:11
Updated-06 Aug, 2024 | 13:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

vdsm and vdsclient does not validate certficate hostname from another vdsm which could facilitate a man-in-the-middle attack

Action-Not Available
Vendor-vdsm and vdsclientRed Hat, Inc.
Product-vdscliententerprise_virtualizationvirtual_desktop_server_managervdsm and vdsclient
CWE ID-CWE-295
Improper Certificate Validation
CVE-2013-5661
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-1.07% / 77.73%
||
7 Day CHG~0.00%
Published-05 Nov, 2019 | 18:14
Updated-06 Aug, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cache Poisoning issue exists in DNS Response Rate Limiting.

Action-Not Available
Vendor-nlnetlabsnicn/aRed Hat, Inc.Internet Systems Consortium, Inc.
Product-nsdknot_resolverbindenterprise_linuxn/a
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2012-3446
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.34% / 56.51%
||
7 Day CHG~0.00%
Published-04 Nov, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-libcloudn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-10155
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.1||LOW
EPSS-0.22% / 44.83%
||
7 Day CHG~0.00%
Published-12 Jun, 2019 | 13:51
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.

Action-Not Available
Vendor-libreswanstrongswanxelerancethe libreswan ProjectRed Hat, Inc.Fedora Project
Product-strongswanfedoraenterprise_linuxlibreswanopenswanlibreswan
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2025-24148
Matching Score-6
Assigner-Apple Inc.
ShareView Details
Matching Score-6
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.43%
||
7 Day CHG~0.00%
Published-31 Mar, 2025 | 22:22
Updated-02 Apr, 2026 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed with improved handling of executable types. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. A malicious JAR file may bypass Gatekeeper checks.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2018-5382
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-4.4||MEDIUM
EPSS-0.15% / 35.98%
||
7 Day CHG~0.00%
Published-16 Apr, 2018 | 13:00
Updated-12 May, 2025 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bouncy Castle BKS-V1 keystore files vulnerable to trivial hash collisions

The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.

Action-Not Available
Vendor-bouncycastleLegion of the Bouncy CastleRed Hat, Inc.
Product-satellite_capsulesatellitebc-javaBouncy Castle
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2026-32318
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-7.6||HIGH
EPSS-0.01% / 1.78%
||
7 Day CHG~0.00%
Published-20 Mar, 2026 | 18:27
Updated-26 Mar, 2026 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cryptomator for IOS: Tampered vault configuration allows MITM attack on Hub API

Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 2.8.3.

Action-Not Available
Vendor-cryptomatorcryptomatorApple Inc.
Product-iphone_oscryptomatorios
CWE ID-CWE-346
Origin Validation Error
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CWE ID-CWE-451
User Interface (UI) Misrepresentation of Critical Information
CWE ID-CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
CVE-2021-3772
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 37.34%
||
7 Day CHG~0.00%
Published-02 Mar, 2022 | 00:00
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.

Action-Not Available
Vendor-n/aRed Hat, Inc.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/LinuxOracle Corporation
Product-h500ssolidfire_\&_hci_management_nodeh615c_firmwareenterprise_linuxh300s_firmwareh410c_firmwarecommunications_cloud_native_core_network_exposure_functionh410ssolidfire_\&_hci_storage_nodeh610s_firmwareh300shci_compute_nodecommunications_cloud_native_core_policyh610sdebian_linuxlinux_kernelh410s_firmwaree-series_santricity_os_controllerh500s_firmwareh610ch700s_firmwarecommunications_cloud_native_core_binding_support_functionh410ch615ch700sh610c_firmwarekernel
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2017-3224
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.03% / 6.98%
||
7 Day CHG~0.00%
Published-24 Jul, 2018 | 15:00
Updated-05 Aug, 2024 | 14:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Shortest Path First (OSPF) protocol implementations may improperly determine LSA recency in affected Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages)

Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages).

Action-Not Available
Vendor-quaggaOpen Shortest Path First (OSPF)Red Hat, Inc.SUSE
Product-opensusepackage_managersuse_linuxquaggaProtocol
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-25862
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.09%
||
7 Day CHG~0.00%
Published-06 Oct, 2020 | 14:41
Updated-04 Aug, 2024 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.

Action-Not Available
Vendor-n/aWireshark FoundationDebian GNU/LinuxOracle CorporationFedora ProjectopenSUSE
Product-zfs_storage_appliance_firmwaredebian_linuxfedorawiresharkleapn/a
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2012-1170
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.48%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:29
Updated-06 Aug, 2024 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Moodle before 2.2.2 has an external enrolment plugin context check issue where capability checks are not thorough

Action-Not Available
Vendor-Moodle Pty LtdFedora Project
Product-fedoramoodleMoodle
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2023-38802
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.94% / 76.35%
||
7 Day CHG~0.00%
Published-29 Aug, 2023 | 00:00
Updated-02 Oct, 2024 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).

Action-Not Available
Vendor-pica8frroutingn/aDebian GNU/LinuxFedora Project
Product-picosdebian_linuxfedorafrroutingn/a
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2021-4148
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.25%
||
7 Day CHG~0.00%
Published-23 Mar, 2022 | 19:46
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, Inc
Product-fedoralinux_kernelkernel
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2016-15028
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.13% / 32.11%
||
7 Day CHG~0.00%
Published-12 Mar, 2023 | 14:31
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ICEPAY REST-API-NET Checksum Validation RestClient.cs RestClient integrity check

A vulnerability was found in ICEPAY REST-API-NET 0.9. It has been declared as problematic. Affected by this vulnerability is the function RestClient of the file Classes/RestClient.cs of the component Checksum Validation. The manipulation leads to improper validation of integrity check value. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.0 is able to address this issue. The patch is named 61f6b8758e5c971abff5f901cfa9f231052b775f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222847.

Action-Not Available
Vendor-icepayICEPAY
Product-rest_apiREST-API-NET
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2023-34459
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.86% / 75.12%
||
7 Day CHG+0.05%
Published-16 Jun, 2023 | 22:13
Updated-16 Dec, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenZeppelin Contracts's MerkleProof multiproofs may allow proving arbitrary leaves for specific trees

OpenZeppelin Contracts is a library for smart contract development. Starting in version 4.7.0 and prior to version 4.9.2, when the `verifyMultiProof`, `verifyMultiProofCalldata`, `procesprocessMultiProof`, or `processMultiProofCalldat` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves. A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertedly for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree. A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the @openzeppelin/merkle-tree library are safe. The problem has been patched in version 4.9.2. Some workarounds are available. For those using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the @openzeppelin/merkle-tree package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves.

Action-Not Available
Vendor-openzeppelinOpenZeppelin
Product-contractscontracts_upgradeableopenzeppelin-contracts
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2023-23120
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.15% / 35.09%
||
7 Day CHG~0.00%
Published-02 Feb, 2023 | 00:00
Updated-26 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes TRENDnet TV-IP651WI Network Camera firmware version v1.07.01 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification.

Action-Not Available
Vendor-n/aTRENDnet, Inc.
Product-tv-ip651wi_firmwaretv-ip651win/a
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2023-23119
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.15% / 35.09%
||
7 Day CHG~0.00%
Published-02 Feb, 2023 | 00:00
Updated-26 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes Ubiquiti airFiber AF2X Radio firmware version 3.2.2 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification.

Action-Not Available
Vendor-n/aUbiquiti Inc.
Product-af-2x_firmwareaf-2xn/a
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2019-1166
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.9||MEDIUM
EPSS-13.00% / 94.10%
||
7 Day CHG~0.00%
Published-10 Oct, 2019 | 13:28
Updated-04 Aug, 2024 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka 'Windows NTLM Tampering Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008WindowsWindows ServerWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows Server, version 1903 (Server Core installation)
CWE ID-CWE-354
Improper Validation of Integrity Check Value
  • Previous
  • 1
  • 2
  • Next
Details not found