Lucene search

K
githubGitHub Advisory DatabaseGHSA-2326-HX7G-3M9R
HistoryAug 12, 2024 - 6:30 p.m.

Apache MINA SSHD: integrity check bypass

2024-08-1218:30:47
CWE-354
GitHub Advisory Database
github.com
10
apache mina sshd
integrity check
bypass
cve-2023-48795
terrapin attack
mitigations
upgrade
software
connection issue

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

6

Confidence

High

EPSS

0.965

Percentile

99.6%

Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which
some security features have been downgraded or disabled, aka a Terrapin
attack

The mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected.

Affected configurations

Vulners
Node
org.apache.sshdsshd-commonRange<2.12.0
VendorProductVersionCPE
org.apache.sshdsshd-common*cpe:2.3:a:org.apache.sshd:sshd-common:*:*:*:*:*:*:*:*

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

6

Confidence

High

EPSS

0.965

Percentile

99.6%