CVE-2020-14145
moderate-risk
Published 2020-06-29
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
Do I need to act?
~
1.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (12)
References (16)
Third Party Advisory
https://docs.ssh-mitm.at/CVE-2020-14145.html
Third Party Advisory
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/sessio...
Third Party Advisory
https://security.gentoo.org/glsa/202105-35
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200709-0004/
Third Party Advisory
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-in...
Third Party Advisory
https://docs.ssh-mitm.at/CVE-2020-14145.html
Third Party Advisory
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/sessio...
Third Party Advisory
https://security.gentoo.org/glsa/202105-35
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200709-0004/
Third Party Advisory
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-in...
39
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
4/34 · Minimal
Exposure
17/34 · Moderate