OpenSSH Terrapin Attack
Vulnerability details
The Terrapin attack is a vulnerability in the SSH protocol itself. It results in the compromised client mistakenly perceiving that the server does not support recent signature algorithms used in user authentication. This vulnerability can be exploited through a man-in-the-middle (MitM) attack.
Impacted products
Revisions
Version |
Date |
Description |
v1 |
|
Initial release |
Stormshield Management Center |
CVSS v3.1 Overall Score: 6.5
|
Analysis
|
Impacted version
|
The vulnerability impacts all SSH connections and is specifically focused on the OpenSSH implementation. The vulnerable OpenSSH configurations are:
- chacha20-poly1305@openssh.com
- Any AES(128|192|256)-cbc ciphers
- Any MACs that use Encrypt-then-MAC (EtM), such as hmac-(sha2-512|sha2-256|sha1|sha1-96|md5-96|md5)-etm@openssh.com and umac-(128|64)-etm@openssh.com
|
|
Workaround solution
|
Solution
|
There is no workaround solution.
|
The 3.6.0 update will fix this vulnerability.
|
Attack Vector |
Attack Complexity |
Privileges Required |
User Interaction |
Scope |
Confidentiality Impact |
Integrity Impact |
Availability impact |
Adjacent Network |
High |
None |
None |
Unchanged |
High |
High |
None |
Exploit Code Maturity |
Remediation Level |
Report Confidence |
Proof of concept code |
Official fix |
Reasonable |
Confidentiality Requirement |
Integrity Requirement |
Availability Requirement |
Medium |
High |
High |