Vulnerability Details : CVE-2020-14145
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
Products affected by CVE-2020-14145
- cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:8.4:-:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:8.5:-:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:*
- cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
- cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*
- cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
- cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*
Threat overview for CVE-2020-14145
Top countries where our scanners detected CVE-2020-14145
Top open port discovered on systems with this issue
22
IPs affected by CVE-2020-14145 39,341,640
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2020-14145!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2020-14145
1.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-14145
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2020-14145
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-14145
-
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
openssh.git - Portable OpenSSHPatch;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20200709-0004/
CVE-2020-14145 OpenSSH Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
ssh-mitm/cve202014145.py at master · ssh-mitm/ssh-mitm · GitHubThird Party Advisory
-
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
Detail en : FZI Forschungszentrum InformatikThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2020/12/02/1
oss-security - Some mitigation for openssh CVE-2020-14145Mailing List;Patch;Third Party Advisory
-
https://docs.ssh-mitm.at/CVE-2020-14145.html
SSH-MITM Docs - CVE-2020-14145Third Party Advisory
-
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
Comparing V_8_3_P1...V_8_4_P1 · openssh/openssh-portable · GitHubPatch;Third Party Advisory
-
https://security.gentoo.org/glsa/202105-35
OpenSSH: Multiple vulnerabilities (GLSA 202105-35) — Gentoo securityThird Party Advisory
Jump to