Lucene search

K
broadcomBroadcom Security ResponseBSNSA22345
HistoryAug 01, 2023 - 12:00 a.m.

The client side in OpenSSH 5.7 through 8.3 has an Observable Discrepancy leading to an information leak in the algorithm negotiation

2023-08-0100:00:00
Broadcom Security Response
support.broadcom.com
12
openssh
client side
observable discrepancy
information leak
algorithm negotiation
man-in-the-middle
initial connection

7.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.9%

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.