The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2020-06-29T18:15:11.940
2024-11-21T05:02:44.080
Modified
CVSSv3.1: 5.9 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:N/A:N
8.6
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | openbsd | openssh | < 8.4 | Yes |
| Application | openbsd | openssh | 8.4 | Yes |
| Application | openbsd | openssh | 8.5 | Yes |
| Application | openbsd | openssh | 8.6 | Yes |
| Operating System | netapp | aff_a700s_firmware | - | Yes |
| Hardware | netapp | aff_a700s | - | No |
| Application | netapp | active_iq_unified_manager | ≥ 9.5 | Yes |
| Application | netapp | hci_management_node | - | Yes |
| Application | netapp | ontap_select_deploy_administration_utility | - | Yes |
| Application | netapp | solidfire | - | Yes |
| Application | netapp | steelstore_cloud_integrated_storage | - | Yes |
| Hardware | netapp | hci_compute_node | - | Yes |
| Hardware | netapp | hci_storage_node | - | Yes |