Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-48795: n/a

0
Medium
VulnerabilityCVE-2023-48795cvecve-2023-48795
Published: Mon Dec 18 2023 (12/18/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

AI-Powered Analysis

AILast updated: 11/10/2025, 21:19:49 UTC

Technical Analysis

CVE-2023-48795 is a vulnerability in the SSH transport protocol as implemented in OpenSSH versions prior to 9.6 and a wide array of other SSH clients, servers, and libraries. The root cause lies in the SSH Binary Packet Protocol (BPP) extensions mishandling the handshake phase and sequence numbers. During the SSH handshake, extension negotiation messages are exchanged to establish security parameters. Due to improper handling, some packets can be omitted without detection, effectively bypassing integrity checks. This flaw enables an attacker to downgrade or disable certain security features on the connection, such as the use of ChaCha20-Poly1305 and CBC with Encrypt-then-MAC (EtM) algorithms. The attack, known as the Terrapin attack, exploits the fact that the protocol does not properly verify the completeness and order of extension negotiation packets, allowing selective omission. Affected products include OpenSSH before 9.6, PuTTY before 0.80, Dropbear through 2022.83, libssh before 0.10.6, libssh2 through 1.11.0, Paramiko before 3.4.0, WinSCP before 6.2.2, and many others across different programming languages and platforms. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. Although no public exploits are known yet, the broad impact surface and the critical role of SSH in secure communications make this a significant threat. The CVSS v3.1 base score is 5.9 (medium), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and impact limited to integrity compromise without confidentiality or availability loss. The CWE classification is CWE-354 (Improper Integrity Check).

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of SSH connections used for remote administration, secure file transfers, and automated processes. Attackers exploiting this flaw could cause silent downgrades or disable security features, potentially allowing interception or modification of data in transit without detection. This undermines trust in SSH tunnels, which are foundational for securing critical infrastructure, cloud environments, and enterprise networks. Sectors such as finance, energy, telecommunications, and government agencies in Europe that rely heavily on SSH for secure remote access and management are particularly vulnerable. The integrity bypass could facilitate further attacks, including lateral movement or data manipulation, increasing the risk of espionage or sabotage. Although confidentiality and availability are not directly impacted, the integrity compromise can lead to significant operational and reputational damage. The medium severity score suggests a moderate but non-trivial risk, especially given the widespread use of affected SSH implementations across European IT environments.

Mitigation Recommendations

1. Immediately inventory all SSH clients, servers, and libraries in use across the organization to identify affected versions. 2. Prioritize patching to the latest versions of OpenSSH (9.6 or later) and other affected products as soon as vendor updates become available. 3. For environments where immediate patching is not feasible, consider restricting SSH access to trusted networks and hosts using network segmentation and firewall rules to reduce exposure. 4. Monitor SSH traffic for anomalies that may indicate tampering or downgrade attempts, leveraging advanced network detection tools capable of inspecting SSH handshake behavior. 5. Enforce strict cryptographic policies that disable weaker or deprecated algorithms and prefer robust, well-vetted cipher suites. 6. Employ multi-factor authentication and robust logging to detect suspicious SSH session activities. 7. Engage with vendors and open-source communities to track patch releases and vulnerability disclosures. 8. Conduct penetration testing and red team exercises simulating this attack vector to validate defenses. 9. Educate system administrators and security teams about the specific nature of this vulnerability and the importance of timely updates. 10. Consider deploying SSH proxies or gateways that can enforce protocol compliance and integrity checks as an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-20T00:00:00.000Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec88c

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 11/10/2025, 9:19:49 PM

Last updated: 12/4/2025, 11:18:33 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

NVD DatabaseMITRE CVEReference 1Reference 2Reference 3Reference 4Reference 5Reference 6Reference 7Reference 8Reference 9Reference 10Reference 11Reference 12Reference 13Reference 14Reference 15Reference 16Reference 17Reference 18Reference 19Reference 20Reference 21Reference 22Reference 23Reference 24Reference 25Reference 26Reference 27Reference 28Reference 29Reference 30Reference 31Reference 32Reference 33Reference 34Reference 35Reference 36Reference 37Reference 38Reference 39Reference 40Reference 41Reference 42Reference 43Reference 44Reference 45Reference 46Reference 47Reference 48Reference 49Reference 50Reference 51Reference 52Reference 53Reference 54Reference 55Reference 56Reference 57Reference 58Reference 59Reference 60Reference 61Reference 62Reference 63Reference 64Reference 65Reference 66Reference 67Reference 68Reference 69Reference 70Reference 71Reference 72Reference 73Reference 74Reference 75Reference 76Reference 77Reference 78Reference 79Reference 80Reference 81Reference 82Reference 83Reference 84Reference 85Reference 86Reference 87Reference 88Reference 89Reference 90Reference 91Reference 92Reference 93Reference 94Reference 95Reference 96Reference 97Reference 98Reference 99Reference 100Reference 101Reference 102Reference 103Reference 104Reference 105Reference 106Reference 107Reference 108Reference 109Reference 110Reference 111Reference 112Reference 113Reference 114Reference 115Reference 116Reference 117Reference 118Reference 119Reference 120Reference 121Reference 122Reference 123Reference 124Reference 125Reference 126Reference 127Reference 128Reference 129Reference 130Reference 131Reference 132Reference 133Reference 134Search on Google

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats