NA

CVE-2023-46446

Published: 14/11/2023 Updated: 22/12/2023
CVSS v3 Base Score: 6.8 | Impact Score: 5.2 | Exploitability Score: 1.6
VMScore: 0

Vulnerability Summary

An issue in AsyncSSH prior to 2.14.1 allows malicious users to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

asyncssh project asyncssh

Vendor Advisories

Debian Bug report logs - #1055999 python-asyncssh: CVE-2023-46446 Package: src:python-asyncssh; Maintainer for src:python-asyncssh is Debian Python Team <team+python@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 15 Nov 2023 20:51:02 UTC Severity: important Tags: security, upstr ...
Description<!---->A flaw was found in python-synch before the 2141 versions, where the client can log in to the attacker's account without the client being able to detect this This flaw allows an attacker to control the remote end of the SSH session completely, resulting in a complete break of the confidentiality and integrity of the secure chan ...

Github Repositories

This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".

Artifacts for Terrapin This repository contains artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation", accepted at 33rd USENIX Security Symposium The code in this repository contains, among other artifacts, proof-of-concept attack proxies for the following CVEs: CVE-2023-48795 (general protocol flaw) CVE-2023-46445

Recent Articles

SSH shaken, not stirred by Terrapin vulnerability
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources No need to panic, but grab those updates or mitigations anyway just to be safe

A vulnerability in the SSH protocol can be exploited by a well-placed adversary to weaken the security of people's connections, if conditions are right. In a successful man-in-the-middle attack, the adversary may be able to force SSH clients to use weaker authentication methods and disable some defense mechanisms. It is hard right now to pin down the true realistic impact of the flaw because it all depends on individual client-server configurations, implementations of the protocol, and other var...