CVE-2023-28113
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/03/2023
Last modified:
23/03/2023
Description
russh is a Rust SSH client and server library. Starting in version 0.34.0 and prior to versions 0.36.2 and 0.37.1, Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality. Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping. Most other implementations reject such keys, so this is mainly an interoperability issue in such a case. This issue is fixed in versions 0.36.2 and 0.37.1
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:* | 0.34.0 (including) | 0.36.2 (excluding) |
| cpe:2.3:a:russh_project:russh:0.37.0:-:*:*:*:rust:*:* | ||
| cpe:2.3:a:russh_project:russh:0.37.0:beta1:*:*:*:rust:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L72-L76
- https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L78-L81
- https://github.com/warp-tech/russh/commit/d831a3716d3719dc76f091fcea9d94bd4ef97c6e
- https://github.com/warp-tech/russh/releases/tag/v0.36.2
- https://github.com/warp-tech/russh/releases/tag/v0.37.1
- https://github.com/warp-tech/russh/security/advisories/GHSA-cqvm-j2r2-hwpg



