Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:44223
HistoryNov 10, 2023 - 7:22 a.m.

Rogue Session

2023-11-1007:22:52
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
1
asyncssh
rogue session
state machine flaw
client authentication
confidentiality
integrity
remote control

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.8%

asyncssh is vulnerable to a Rogue Session. The vulnerability is caused by a state machine flaw in the the AsyncSSH server while authenticating a client in which results in the client being forced to to log into the attacker’s account without the client being able to detect this. An attacker can have a complete control over the remote end of the SSH session resulting in a complete break of the confidentiality and integrity of the secure channel.

CPENameOperatorVersion
asyncsshle2.14.0
asyncsshle2.14.0

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.8%