Patch

CVE-2023-48795

with vRx

Vulnerability Overview
CVE Name
CVE-2023-48795
Severity
5.9
Medium
CVE Description
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server...
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server...
Show more
Show less
Latest Patch info
Patch Name
cve@mitre.org
Date
20.12.2023
Script
Script Type
Detection script
Secure Shell (SSH) is a fundamental protocol for securely connecting to remote servers and devices. However, like any technology, it can have vulnerabilities that need attention. In this post, we'll explore a small Python script designed to detect potential vulnerabilities in SSH configurations SSH vulnerabilities can arise from various factors, including outdated software versions and insecure cipher/MAC configurations. For example, the recently discovered Terrapin Attack (CVE-2023-48795) highlighted a flaw in the SSH protocol itself, impacting the security of SSH connections. The Detection Script I've developed a small Python script that helps in detecting potential SSH vulnerabilities. Let's break down its functionality: 1. SSH Version Detection: - The script checks the SSH version using the ssh -V command. - It parses the output to determine the OpenSSH version installed on the system. 2. Cipher/MAC Configuration Analysis: - The script runs sshd -T to fetch the SSH server's configuration details. - It extracts cipher and MAC configurations from the output using regular expressions. 3. Vulnerability Assessment: - Based on the version and configuration data, the script identifies potentially vulnerable setups. - It flags configurations that use outdated ciphers or MACs susceptible to specific attacks. How to Use the Script in using in Linux To utilize the script effectively, follow these steps: 1. Download the Script: - Save the Python script to your local machine. 2. Execute the Script: - Open a terminal or command prompt. - Navigate to the directory containing the script. - Run the script using Python: filename.py. 3. Review the Output: - The script will display the SSH version and analyze cipher/MAC configurations. - It will indicate whether the setup is safe or potentially vulnerable. 4. Take Action: - Based on the script's findings, take necessary actions to update SSH versions or secure configurations. How to Use script if using the PowerShell Open PowerShell: Launch PowerShell with administrative privileges. Paste the Script: Copy and paste the provided PowerShell script into the PowerShell console. Execute the Script: Press Enter to run the script. Review the Output: The script will display information about the SSH version and analyze cipher/MAC configurations for potential vulnerabilities. Conclusion Detecting SSH vulnerabilities is crucial for maintaining secure communication channels. By using tools like the provided Python script, system administrators and security professionals can stay vigilant against potential threats and ensure robust SSH configurations. Remember, security is an ongoing process, and regular audits and updates are key to a resilient infrastructure. Stay secure, stay informed!
Secure Shell (SSH) is a fundamental protocol for securely connecting to remote servers and devices. However, like any technology, it can have vulnerabilities that need attention. In this post, we'll explore a small Python script designed to detect potential vulnerabilities in SSH configurations SSH vulnerabilities can arise from various factors, including outdated software versions and insecure cipher/MAC configurations. For example, the recently discovered Terrapin Attack (CVE-2023-48795) highlighted a flaw in the SSH protocol itself, impacting the security of SSH connections. The Detection Script I've developed a small Python script that helps in detecting potential SSH vulnerabilities. Let's break down its functionality: 1. SSH Version Detection: - The script checks the SSH version using the ssh -V command. - It parses the output to determine the OpenSSH version installed on the system. 2. Cipher/MAC Configuration Analysis: - The script runs sshd -T to fetch the SSH server's configuration details. - It extracts cipher and MAC configurations from the output using regular expressions. 3. Vulnerability Assessment: - Based on the version and configuration data, the script identifies potentially vulnerable setups. - It flags configurations that use outdated ciphers or MACs susceptible to specific attacks. How to Use the Script in using in Linux To utilize the script effectively, follow these steps: 1. Download the Script: - Save the Python script to your local machine. 2. Execute the Script: - Open a terminal or command prompt. - Navigate to the directory containing the script. - Run the script using Python: filename.py. 3. Review the Output: - The script will display the SSH version and analyze cipher/MAC configurations. - It will indicate whether the setup is safe or potentially vulnerable. 4. Take Action: - Based on the script's findings, take necessary actions to update SSH versions or secure configurations. How to Use script if using the PowerShell Open PowerShell: Launch PowerShell with administrative privileges. Paste the Script: Copy and paste the provided PowerShell script into the PowerShell console. Execute the Script: Press Enter to run the script. Review the Output: The script will display information about the SSH version and analyze cipher/MAC configurations for potential vulnerabilities. Conclusion Detecting SSH vulnerabilities is crucial for maintaining secure communication channels. By using tools like the provided Python script, system administrators and security professionals can stay vigilant against potential threats and ensure robust SSH configurations. Remember, security is an ongoing process, and regular audits and updates are key to a resilient infrastructure. Stay secure, stay informed!
Affected OS & Apps
Openshift Container Platform
by
Redhat
Jboss Enterprise Application Platform
by
Redhat
Single Sign-On
by
Redhat
Openshift Container Platform
by
Redhat
Jboss Enterprise Application Platform
by
Redhat
Single Sign-On
by
Redhat
Keycloak
by
Redhat
Openstack Platform
by
Redhat
Sftpgo
by
Sftpgo Project
Openssh
by
Openbsd
Powershell
by
Microsoft
Crushftp
by
Crushftp
Filezilla Client
by
Filezilla-Project
Winscp
by
Winscp
Putty
by
Putty
Openshift Developer Tools and Services
by
Redhat
Kitty
by
9BIS
Libssh
by
Libssh
Proftpd
by
Proftpd
Pfsense CE
by
Netgate
Xshell 7
by
Netsarang
Sshlib
by
Connectbot
Transmit 5
by
Panic
MacOS
by
Apple
Debian Linux
by
Debian
Fedora
by
Fedoraproject
Enterprise Linux
by
Redhat
Mac OS X
by
Apple
Freebsd
by
Freebsd
Lcos LX
by
Lancom-Systems
Lcos SX
by
Lancom-Systems
Lanconfig
by
Lancom-Systems
LcOS
by
Lancom-Systems
Sftp Gateway Firmware
by
Thorntech
Lcos FX
by
Lancom-Systems
Show more
4.7

Patch faster and smarter
with vRx

Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Trusted by 600+ customers:

Solution

Patch faster and better with vRx

Patch Management

vRx automatically deploys patches across all systems, cutting patching time by 80%.

Scripting Engine

vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.

Patchless Protection

vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.
Shortlist 2024 by Captera
4.9
Customer first by Gartner
4.7
Leader spring by G2
4.9

Hear from our Customers

Valuable resources saved

"Before vRx, we would spend countless hours manually finding and verifying patches. We saved so much time (and headache!)."
Anonymous IT Operations LeadAnonymous IT Operations Lead
Anonymous IT Operations Lead
IT Operations Lead

Third-party software patching is the most valuable feature.

"We have automated third-party patching on specific software, improving efficiency by 80%. vRx has reduced our patching time, which has improved our operations. It is more robust than other solutions because it offers better third-party remediation."
Billy TurnerBilly Turner
Billy Turner
VP, Managed Technology & Services

Single source of truth, capable of handling any application in our fleet

"vRx gives a single pane of glass to see what patches needed to go out and what sort of vulnerabilities we have on our Windows machines. Our meantime to remediate vulnerabilities has gone down by about 60% to 70%."
Peter FallowfieldPeter Fallowfield
Peter Fallowfield
IT Manager

60% faster remediation, many hours saved

"Typically, with our previous solution of ManageEngine, it took about three hours to patch Windows Server, and now, that is less than an hour. It means less downtime for the business each month when we do patches."
Anonymous Security AnalystAnonymous Security Analyst
Anonymous Security Analyst
Security Analyst

Great patching capabilities, helpful dashboard, and excellent support

"vRx has saved us an incredible amount of time. We can just rely on the automated system and the schedules we've set. It's a huge time saver. It's saved us hundreds of hours."
Michael CortezMichael Cortez
Michael Cortez
Sr. Director of IT

My favorite feature is Patchless Protection

"With Vicarius' vRx, I've never seen a patch that failed or had to be rolled back. We're saving quite a bit of time. Our clients using vRx haven't had any issues, and they've easily established patching for all their endpoints. "
Jeremy HermanJeremy Herman
Jeremy Herman
Security Engineer

Unified vulnerability discovery, prioritization, and remediation

"Vicarius streamlines vulnerability management between IT & Security by directly linking identified vulnerabilities to required patches, enhancing efficiency. The automation process has saved at least 30 percent of our manual tasks."
Wayne AjimineWayne Ajimine
Wayne Ajimine
Information Security Professional

Patchless Protection is an incredible technology!

"vRx reduces the time customers spend on patching by reducing the overhead on the administrators, allowing them to do additional work. It saves time they would spend addressing the patching process, follow-ups, etc."
Antwune GrayAntwune Gray
Antwune Gray
VP IT Security and Services

Merge Security & IT to Remediate Threats

“Vicarius’s vRx enabled Adama to centralize and consolidate work between IT and security teams, leading to a more efficient patching workflow."
Oshri CohenOshri Cohen
Oshri Cohen
CISO
4.7

Automated Patching, Scripting, and more

Talk with our team to get a personal walkthrough
Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.