Improper Validation of Integrity Check Value Affecting asyncssh package, versions [,2.14.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-ASYNCSSH-6054436
  • published10 Nov 2023
  • disclosed9 Nov 2023
  • creditFabian Bäumer, Jörg Schwenk, Marcus Brinkmann

Introduced: 9 Nov 2023

CVE-2023-46445  (opens in a new tab)
CWE-354  (opens in a new tab)

How to fix?

Upgrade asyncssh to version 2.14.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Validation of Integrity Check Value. An attacker can exploit an implementation flaw in the AsyncSSH implementation to inject an extension info message chosen by the attacker and delete the original extension info message, effectively replacing it.

Note: AsyncSSH supports the server-sig-algs and global-requests-ok extensions. Hence, the attacker can downgrade the algorithm used for client authentication by meddling with the value of server-sig-algs.

References

CVSS Scores

version 3.1