Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-14145


The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.


Published

2020-06-29T18:15:11.940

Last Modified

2024-11-21T05:02:44.080

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-203

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openbsd openssh < 8.4 Yes
Application openbsd openssh 8.4 Yes
Application openbsd openssh 8.5 Yes
Application openbsd openssh 8.6 Yes
Operating System netapp aff_a700s_firmware - Yes
Hardware netapp aff_a700s - No
Application netapp active_iq_unified_manager ≥ 9.5 Yes
Application netapp hci_management_node - Yes
Application netapp ontap_select_deploy_administration_utility - Yes
Application netapp solidfire - Yes
Application netapp steelstore_cloud_integrated_storage - Yes
Hardware netapp hci_compute_node - Yes
Hardware netapp hci_storage_node - Yes

References