5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
7.4 High
AI Score
Confidence
Low
0.963 High
EPSS
Percentile
99.5%
Simon Tatham reports:
PuTTY version 0.80 [contains] one security fix […] for a newly discovered security issue known as the ‘Terrapin’
attack, also numbered CVE-2023-48795. The issue affects widely-used
OpenSSH extensions to the SSH protocol: the ChaCha20+Poly1305
cipher system, and ‘encrypt-then-MAC’ mode.
In order to benefit from the fix, you must be using a fixed version
of PuTTY and a server with the fix, so that they can agree to
adopt a modified version of the protocol. […]
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
7.4 High
AI Score
Confidence
Low
0.963 High
EPSS
Percentile
99.5%