6.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
7.1 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
36.8%
asyncssh is vulnerable to a Rogue Session. The vulnerability is caused by a state machine flaw in the the AsyncSSH server while authenticating a client in which results in the client being forced to to log into the attacker’s account without the client being able to detect this. An attacker can have a complete control over the remote end of the SSH session resulting in a complete break of the confidentiality and integrity of the secure channel.
packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
github.com/advisories/GHSA-c35q-ffpf-5qpm
github.com/ronf/asyncssh/blob/develop/docs/changes.rst
github.com/ronf/asyncssh/commit/83e43f5ea3470a8617fc388c72b062c7136efd7e
github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ME34ROZWMDK5KLMZKTSA422XVJZ7IMTE/
security.netapp.com/advisory/ntap-20231222-0001/
www.terrapin-attack.com
6.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
7.1 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
36.8%