CVE-2023-46446
Python vulnerability analysis and mitigation

Overview

An issue in AsyncSSH before version 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, known as a 'Rogue Session Attack'. The vulnerability was discovered in late 2023 and is tracked as CVE-2023-46446. The vulnerability affects AsyncSSH versions 2.14.0 and earlier (GitHub Advisory, NVD).

Technical details

The vulnerability works by allowing attackers to inject a chosen authentication request before the client's NewKeys. The authentication request must contain valid attacker credentials and can use any authentication mechanism that doesn't require exchanging additional messages between client and server, such as password or publickey. Due to a state machine flaw, the AsyncSSH server accepts the unauthenticated user authentication request message and defers it until the client has requested the authentication protocol. The vulnerability has been assigned a CVSS v3.1 base score of 6.8 (Medium) with vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N (GitHub Advisory, NVD).

Impact

The impact heavily depends on the application logic implemented by the AsyncSSH server. In the worst case, when the AsyncSSH server starts a shell for the authenticated user upon connection, the attacker can prepare a modified shell beforehand to perform perfect phishing attacks and become a Man-in-the-Middle at the application layer. The attacker receives all keyboard input by the user, completely controls the terminal output of the user's session, can send and receive data to/from forwarded network ports, and is able to create signatures with a forwarded SSH Agent, if any (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in AsyncSSH version 2.14.1. Users are advised to upgrade to this version or later to protect against this vulnerability. The fix includes hardening of the AsyncSSH state machine against potential message injection attacks (AsyncSSH Changes).

Community reactions

Multiple vendors and distributions have responded to this vulnerability by releasing security advisories and patches. NetApp has issued an advisory for their affected products (NetApp Advisory), and Fedora has released updated packages to address the vulnerability (Fedora Update).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management