Lucene search

K
broadcomBroadcom Security ResponseBSNSA22345
HistoryAug 01, 2023 - 12:00 a.m.

The client side in OpenSSH 5.7 through 8.3 has an Observable Discrepancy leading to an information leak in the algorithm negotiation

2023-08-0100:00:00
Broadcom Security Response
support.broadcom.com
8

7.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.4%

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.