6.8
CVE-2023-46446
- EPSS 0.53%
- Veröffentlicht 14.11.2023 03:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:28
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Asyncssh Project ≫ Asyncssh Version < 2.14.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.53% | 0.662 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 1.6 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.