跳转到帖子

Impact of Terrapin SSH Attack

recommended_posts

发布于
  • Members

Impact of Terrapin SSH Attack

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:C/A:N)
Published
01/09/2024
Created
01/08/2025
Added
01/07/2025
Modified
01/16/2025

Description

The Terrapin attack allows an attacker with the ability to intercept SSH traffic on affected Palo Alto Networks products (through machine-in-the-middle or MitM attacks) to downgrade connection security and force the usage of less secure client authentication algorithms when an administrator or user connects to the product. This issue does not impact the SSH server component of PAN-OS software configured to exclusively use strong cipher algorithms or configured to operate in FIPS-CC mode, which removes support for the impacted algorithms. When using the PAN-OS SSH client to connect to an SSH server that supports the CHACHA20-POLY1305 algorithm or any Encrypt-then-MAC algorithms, the traffic is susceptible to this attack. This issue affects Prisma SD-WAN ION devices. Additional information and technical details about the attack can be found at https://terrapin-attack.com.

Solution(s)

  • palo-alto-networks-pan-os-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-48795
  • CVE - 2023-48795
  • https://security.paloaltonetworks.com/CVE-2023-48795
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…