6.8
CVE-2023-46446
- EPSS 0.4%
- Veröffentlicht 14.11.2023 03:15:09
- Zuletzt bearbeitet 21.11.2024 08:28:31
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Asyncssh Project ≫ Asyncssh Version < 2.14.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.4% | 0.593 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 1.6 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.