logo

CVE-2024-41909 org.apache.sshd:sshd-common

Package

Manager: maven
Name: org.apache.sshd:sshd-common
Vulnerable Version: >=0 <2.12.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00178 pctl0.39637

Details

Apache MINA SSHD: integrity check bypass Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack The mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected.

Metadata

Created: 2024-08-12T18:30:47Z
Modified: 2025-03-27T23:38:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-2326-hx7g-3m9r/GHSA-2326-hx7g-3m9r.json
CWE IDs: ["CWE-354"]
Alternative ID: GHSA-2326-hx7g-3m9r
Finding: F086
Auto approve: 1