Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:44228
HistoryNov 10, 2023 - 9:21 a.m.

Rogue Extension Negotiation

2023-11-1009:21:10
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
3
asyncssh
rogue extension negotiation
man-in-the-middle

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

32.2%

asyncssh is vulnerable to Rogue Extension Negotiation. The vulnerability is caused by an implementation flaw in the AsyncSSH server implementation which leads to an injection of an extension info message chosen by the attacker via a man-in-the-middle attack. This is achieved by downgrading the algorithm used for client authentication by meddling with the value of server-sig-algs (e.g. use of SHA-1 instead of SHA-2). The AsyncSSH uses server-sig-algs and global-requests-ok extensions.

CPENameOperatorVersion
asyncsshle2.14.0
asyncsshle2.14.0

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

32.2%