Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2023-46445 CVE-2023-46446 |
CWE-ID | CWE-345 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
AsyncSSH Server applications / Remote management servers, RDP, SSH |
Vendor | Ron Fredericks, LectureMaker |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU84954
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-46445
CWE-ID:
CWE-345 - Insufficient Verification of Data Authenticity
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to missing verification of data authenticity. A remote attacker can control the extension info message (RFC 8308) via a man-in-the-middle attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAsyncSSH: 0.1.0 - 2.14.0
CPE2.3https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ME34ROZWMDK5KLMZKTSA422XVJZ7IMTE/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84953
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-46446
CWE-ID:
CWE-345 - Insufficient Verification of Data Authenticity
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform MitM attack.
The vulnerability exists due to missing verification of data authenticity. A remote user can control the remote end of an SSH client session via packet injection/removal and shell emulation.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAsyncSSH: 0.1.0 - 2.14.0
CPE2.3https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ME34ROZWMDK5KLMZKTSA422XVJZ7IMTE/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.