{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html", "name": "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://matt.ucc.asn.au/dropbear/CHANGES", "name": "https://matt.ucc.asn.au/dropbear/CHANGES", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://www.openssh.com/openbsd.html", "name": "https://www.openssh.com/openbsd.html", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/openssh/openssh-portable/commits/master", "name": "https://github.com/openssh/openssh-portable/commits/master", "tags": ["Patch"], "refsource": ""}, {"url": "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ", "name": "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ", "tags": ["Mailing List"], "refsource": ""}, {"url": "https://www.bitvise.com/ssh-server-version-history", "name": "https://www.bitvise.com/ssh-server-version-history", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/ronf/asyncssh/tags", "name": "https://github.com/ronf/asyncssh/tags", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://gitlab.com/libssh/libssh-mirror/-/tags", "name": "https://gitlab.com/libssh/libssh-mirror/-/tags", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/", "name": "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42", "name": "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42", "tags": ["Patch"], "refsource": ""}, {"url": "https://www.openssh.com/txt/release-9.6", "name": "https://www.openssh.com/txt/release-9.6", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/", "name": "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/", "tags": ["Press/Media Coverage"], "refsource": ""}, {"url": "https://www.terrapin-attack.com", "name": "https://www.terrapin-attack.com", "tags": ["Exploit"], "refsource": ""}, {"url": "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25", "name": "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25", "tags": ["Patch"], "refsource": ""}, {"url": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst", "name": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://thorntech.com/cve-2023-48795-and-sftp-gateway/", "name": "https://thorntech.com/cve-2023-48795-and-sftp-gateway/", "tags": ["Third Party Advisory"], "refsource": ""}, {"url": "https://github.com/warp-tech/russh/releases/tag/v0.40.2", "name": "https://github.com/warp-tech/russh/releases/tag/v0.40.2", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0", "name": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0", "tags": ["Patch"], "refsource": ""}, {"url": "https://www.openwall.com/lists/oss-security/2023/12/18/2", "name": "https://www.openwall.com/lists/oss-security/2023/12/18/2", "tags": ["Mailing List"], "refsource": ""}, {"url": "https://twitter.com/TrueSkrillor/status/1736774389725565005", "name": "https://twitter.com/TrueSkrillor/status/1736774389725565005", "tags": ["Press/Media Coverage"], "refsource": ""}, {"url": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d", "name": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d", "tags": ["Patch"], "refsource": ""}, {"url": "https://github.com/paramiko/paramiko/issues/2337", "name": "https://github.com/paramiko/paramiko/issues/2337", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg", "name": "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg", "tags": ["Mailing List"], "refsource": ""}, {"url": "https://news.ycombinator.com/item?id=38684904", "name": "https://news.ycombinator.com/item?id=38684904", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://news.ycombinator.com/item?id=38685286", "name": "https://news.ycombinator.com/item?id=38685286", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "http://www.openwall.com/lists/oss-security/2023/12/18/3", "name": "[oss-security] 20231218 CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)", "tags": ["Mailing List"], "refsource": ""}, {"url": "https://github.com/mwiede/jsch/issues/457", "name": "https://github.com/mwiede/jsch/issues/457", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6", "name": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6", "tags": ["Patch"], "refsource": ""}, {"url": "https://github.com/erlang/otp/releases/tag/OTP-26.2.1", "name": "https://github.com/erlang/otp/releases/tag/OTP-26.2.1", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/advisories/GHSA-45x7-px36-x8w8", "name": "https://github.com/advisories/GHSA-45x7-px36-x8w8", "tags": ["Third Party Advisory"], "refsource": ""}, {"url": "https://security-tracker.debian.org/tracker/source-package/libssh2", "name": "https://security-tracker.debian.org/tracker/source-package/libssh2", "tags": ["Vendor Advisory"], "refsource": ""}, {"url": "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg", "name": "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg", "tags": ["Vendor Advisory"], "refsource": ""}, {"url": "https://security-tracker.debian.org/tracker/CVE-2023-48795", "name": "https://security-tracker.debian.org/tracker/CVE-2023-48795", "tags": ["Vendor Advisory"], "refsource": ""}, {"url": "https://bugzilla.suse.com/show_bug.cgi?id=1217950", "name": "https://bugzilla.suse.com/show_bug.cgi?id=1217950", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://bugs.gentoo.org/920280", "name": "https://bugs.gentoo.org/920280", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://ubuntu.com/security/CVE-2023-48795", "name": "https://ubuntu.com/security/CVE-2023-48795", "tags": ["Vendor Advisory"], "refsource": ""}, {"url": "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/", "name": "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/", "tags": ["Press/Media Coverage"], "refsource": ""}, {"url": "https://access.redhat.com/security/cve/cve-2023-48795", "name": "https://access.redhat.com/security/cve/cve-2023-48795", "tags": ["Third Party Advisory"], "refsource": ""}, {"url": "https://github.com/mwiede/jsch/pull/461", "name": "https://github.com/mwiede/jsch/pull/461", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6", "name": "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/libssh2/libssh2/pull/1291", "name": "https://github.com/libssh2/libssh2/pull/1291", "tags": ["Mitigation"], "refsource": ""}, {"url": "https://forum.netgate.com/topic/184941/terrapin-ssh-attack", "name": "https://forum.netgate.com/topic/184941/terrapin-ssh-attack", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5", "name": "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5", "tags": ["Patch"], "refsource": ""}, {"url": "https://github.com/rapier1/hpn-ssh/releases", "name": "https://github.com/rapier1/hpn-ssh/releases", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES", "name": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://www.netsarang.com/en/xshell-update-history/", "name": "https://www.netsarang.com/en/xshell-update-history/", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://www.paramiko.org/changelog.html", "name": "https://www.paramiko.org/changelog.html", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/proftpd/proftpd/issues/456", "name": "https://github.com/proftpd/proftpd/issues/456", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1", "name": "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15", "name": "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15", "tags": ["Product"], "refsource": ""}, {"url": "https://oryx-embedded.com/download/#changelog", "name": "https://oryx-embedded.com/download/#changelog", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update", "name": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22", "name": "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22", "tags": ["Third Party Advisory"], "refsource": ""}, {"url": "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab", "name": "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab", "tags": ["Patch"], "refsource": ""}, {"url": "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3", "name": "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3", "tags": ["Patch"], "refsource": ""}, {"url": "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC", "name": "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC", "tags": ["Patch"], "refsource": ""}, {"url": "https://crates.io/crates/thrussh/versions", "name": "https://crates.io/crates/thrussh/versions", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/NixOS/nixpkgs/pull/275249", "name": "https://github.com/NixOS/nixpkgs/pull/275249", "tags": ["Release Notes"], "refsource": ""}, {"url": "http://www.openwall.com/lists/oss-security/2023/12/19/5", "name": "[oss-security] 20231219 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)", "tags": ["Mailing List"], "refsource": ""}, {"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc", "name": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/", "name": "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/", "tags": ["Press/Media Coverage"], "refsource": ""}, {"url": "http://www.openwall.com/lists/oss-security/2023/12/20/3", "name": "[oss-security] 20231220 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)", "tags": ["Mailing List", "Mitigation"], "refsource": ""}, {"url": "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES", "name": "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES", "name": "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/apache/mina-sshd/issues/445", "name": "https://github.com/apache/mina-sshd/issues/445", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://github.com/hierynomus/sshj/issues/916", "name": "https://github.com/hierynomus/sshj/issues/916", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://github.com/janmojzis/tinyssh/issues/81", "name": "https://github.com/janmojzis/tinyssh/issues/81", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://www.openwall.com/lists/oss-security/2023/12/20/3", "name": "https://www.openwall.com/lists/oss-security/2023/12/20/3", "tags": ["Mailing List", "Mitigation"], "refsource": ""}, {"url": "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2", "name": "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16", "name": "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16", "tags": ["Patch"], "refsource": ""}, {"url": "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html", "name": "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/", "name": "FEDORA-2023-0733306be9", "tags": ["Vendor Advisory"], "refsource": ""}, {"url": "https://www.debian.org/security/2023/dsa-5586", "name": "DSA-5586", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508", "name": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508", "tags": ["Vendor Advisory"], "refsource": ""}, {"url": "https://www.theregister.com/2023/12/20/terrapin_attack_ssh", "name": "https://www.theregister.com/2023/12/20/terrapin_attack_ssh", "tags": ["Press/Media Coverage"], "refsource": ""}, {"url": "https://filezilla-project.org/versions.php", "name": "https://filezilla-project.org/versions.php", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://nova.app/releases/#v11.8", "name": "https://nova.app/releases/#v11.8", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://roumenpetrov.info/secsh/#news20231220", "name": "https://roumenpetrov.info/secsh/#news20231220", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://www.vandyke.com/products/securecrt/history.txt", "name": "https://www.vandyke.com/products/securecrt/history.txt", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://help.panic.com/releasenotes/transmit5/", "name": "https://help.panic.com/releasenotes/transmit5/", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta", "name": "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2189", "name": "https://github.com/PowerShell/Win32-OpenSSH/issues/2189", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://winscp.net/eng/docs/history#6.2.2", "name": "https://winscp.net/eng/docs/history#6.2.2", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://www.bitvise.com/ssh-client-version-history#933", "name": "https://www.bitvise.com/ssh-client-version-history#933", "tags": ["Release Notes"], "refsource": ""}, {"url": "https://github.com/cyd01/KiTTY/issues/520", "name": "https://github.com/cyd01/KiTTY/issues/520", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://www.debian.org/security/2023/dsa-5588", "name": "DSA-5588", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://github.com/ssh-mitm/ssh-mitm/issues/165", "name": "https://github.com/ssh-mitm/ssh-mitm/issues/165", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://news.ycombinator.com/item?id=38732005", "name": "https://news.ycombinator.com/item?id=38732005", "tags": ["Issue Tracking"], "refsource": ""}, {"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html", "name": "[debian-lts-announce] 20231226 [SECURITY] [DLA 3694-1] openssh security update", "tags": ["Mailing List"], "refsource": ""}, {"url": "https://security.gentoo.org/glsa/202312-16", "name": "GLSA-202312-16", "tags": ["Third Party Advisory"], "refsource": ""}, {"url": "https://security.gentoo.org/glsa/202312-17", "name": "GLSA-202312-17", "tags": ["Third Party Advisory"], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/", "name": "FEDORA-2023-20feb865d8", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/", "name": "FEDORA-2023-cb8c606fbb", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/", "name": "FEDORA-2023-e77300e4b5", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/", "name": "FEDORA-2023-b87ec6cf47", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/", "name": "FEDORA-2023-153404713b", "tags": [], "refsource": ""}, {"url": "https://security.netapp.com/advisory/ntap-20240105-0004/", "name": "https://security.netapp.com/advisory/ntap-20240105-0004/", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/", "name": "FEDORA-2024-3bb23c77f3", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/", "name": "FEDORA-2023-55800423a8", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/", "name": "FEDORA-2024-d946b9ad25", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/", "name": "FEDORA-2024-71c2c6526c", "tags": [], "refsource": ""}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/", "name": "FEDORA-2024-39a8c72ea9", "tags": [], "refsource": ""}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-354"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2023-48795", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.2}}, "publishedDate": "2023-12-18T16:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "9.6"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "0.80"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:filezilla-project:filezilla_client:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.66.4"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "11.1.0"}]}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:panic:transmit_5:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.10.4"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:panic:nova:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "11.8"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:roumenpetrov:pkixssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "14.4"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "6.2.2"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:bitvise:ssh_client:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "9.33"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:bitvise:ssh_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "9.32"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:lancom-systems:lcos:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "3.66.4"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:lancom-systems:lcos_fx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:lancom-systems:lcos_lx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:lancom-systems:lcos_sx:5.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:lancom-systems:lcos_sx:4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:lancom-systems:lanconfig:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:vandyke:securecrt:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "9.4.3"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "0.10.6"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:net-ssh:net-ssh:7.2.0:*:*:*:*:ruby:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:ssh2_project:ssh2:*:*:*:*:*:node.js:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.11.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.3.8b"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "12.4"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:crates:thrussh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "0.35.1"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:tera_term_project:tera_term:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "5.1"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:oryx-embedded:cyclone_ssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.3.4"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "10.6.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:netsarang:xshell_7:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "build__0144"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.4.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:ceph_storage:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "0.17.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "0.40.2"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.5.6"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "26.2.1"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:matez:jsch:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "0.2.15"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.11.10"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:asyncssh_project:asyncssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.14.2"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2022.83"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:jadaptive:maverick_synergy_java_ssh_api:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.1.0-snapshot"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.11"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:thorntech:sftp_gateway_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.4.6"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "23.09.1"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:netgate:pfsense_ce:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "2.7.2"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "10.6.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:connectbot:sshlib:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.2.22"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apache:sshd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "2.11.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apache:sshj:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "0.37.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:tinyssh:tinyssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "20230101"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:trilead:ssh2:6401:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:kitty_project:kitty:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "0.76.1.13"}]}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:gentoo:security:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2024-01-11T04:15Z"}