5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
5.6 Medium
AI Score
Confidence
High
0.962 High
EPSS
Percentile
99.5%
Issue Overview:
AWS is aware of CVE-2023-48795, also known as Terrapin, which is found in the SSH protocol and affects SSH channel integrity. A protocol extension has been introduced by OpenSSH which needs to be applied to both the client and the server in order to address this issue. We recommend customers update to the latest version of SSH. (CVE-2023-48795)
Affected Packages:
openssh
Issue Correction:
Run yum update openssh to update your system.
New Packages:
i686:
openssh-cavs-7.4p1-22.81.amzn1.i686
openssh-ldap-7.4p1-22.81.amzn1.i686
openssh-server-7.4p1-22.81.amzn1.i686
pam_ssh_agent_auth-0.10.3-2.22.81.amzn1.i686
openssh-clients-7.4p1-22.81.amzn1.i686
openssh-7.4p1-22.81.amzn1.i686
openssh-debuginfo-7.4p1-22.81.amzn1.i686
openssh-keycat-7.4p1-22.81.amzn1.i686
src:
openssh-7.4p1-22.81.amzn1.src
x86_64:
pam_ssh_agent_auth-0.10.3-2.22.81.amzn1.x86_64
openssh-debuginfo-7.4p1-22.81.amzn1.x86_64
openssh-cavs-7.4p1-22.81.amzn1.x86_64
openssh-keycat-7.4p1-22.81.amzn1.x86_64
openssh-7.4p1-22.81.amzn1.x86_64
openssh-clients-7.4p1-22.81.amzn1.x86_64
openssh-ldap-7.4p1-22.81.amzn1.x86_64
openssh-server-7.4p1-22.81.amzn1.x86_64
Red Hat: CVE-2023-48795
Mitre: CVE-2023-48795
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | openssh-cavs | < 7.4p1-22.81.amzn1 | openssh-cavs-7.4p1-22.81.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssh-ldap | < 7.4p1-22.81.amzn1 | openssh-ldap-7.4p1-22.81.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssh-server | < 7.4p1-22.81.amzn1 | openssh-server-7.4p1-22.81.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | pam_ssh_agent_auth | < 0.10.3-2.22.81.amzn1 | pam_ssh_agent_auth-0.10.3-2.22.81.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssh-clients | < 7.4p1-22.81.amzn1 | openssh-clients-7.4p1-22.81.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssh | < 7.4p1-22.81.amzn1 | openssh-7.4p1-22.81.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssh-debuginfo | < 7.4p1-22.81.amzn1 | openssh-debuginfo-7.4p1-22.81.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssh-keycat | < 7.4p1-22.81.amzn1 | openssh-keycat-7.4p1-22.81.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | pam_ssh_agent_auth | < 0.10.3-2.22.81.amzn1 | pam_ssh_agent_auth-0.10.3-2.22.81.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssh-debuginfo | < 7.4p1-22.81.amzn1 | openssh-debuginfo-7.4p1-22.81.amzn1.x86_64.rpm |
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
5.6 Medium
AI Score
Confidence
High
0.962 High
EPSS
Percentile
99.5%