CVE-2023-48795 Impact of Terrapin SSH Attack

Related Vulnerabilities: CVE-2023-48795  

CVE-2023-48795 Impact of Terrapin SSH Attack

Palo Alto Networks Security Advisories / CVE-2023-48795

CVE-2023-48795 Impact of Terrapin SSH Attack


Informational

Description

The Terrapin attack allows an attacker with the ability to intercept SSH traffic on the PAN-OS management network (machine-in-the-middle or MitM attacks) to downgrade connection security and force the usage of less secure client authentication algorithms when an administrator connects to PAN-OS software.

This issue does not impact PAN-OS software configured to exclusively use strong cipher algorithms or configured to operate in FIPS-CC mode, which removes support for the impacted algorithms.

Additional information and technical details about the attack can be found at https://terrapin-attack.com.

Product Status

VersionsAffectedUnaffected
PAN-OS Devices using affected ciphersDevices not using affected ciphers

Required Configuration for Exposure

PAN-OS software configured with support for the CHACHA20-POLY1305 algorithm or any Encrypt-then-MAC algorithms (ciphers with -etm in the name) enables the Terrapin Attack and are impacted by this issue.

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-354 Improper Validation of Integrity Check Value

Solution

Customers can resolve this issue by removing support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. Guidance on how to configure strong ciphers and algorithms can be found on the following pages:

- https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004OOQCA2

- https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-cli-quick-start/get-started-with-the-cli/refresh-ssh-keys-mgt-port-connection

This issue is completely resolved by following the recommended best practices for deploying PAN-OS (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices). No additional PAN-OS fixes are planned in maintenance releases at this time.

Timeline

Initial publication