So everyone has heard about Terapin,
CVE-2023-48795
CVE-2023-46445
CVE-2023-46446
I find Ubuntu has released patches, also FreeBSD.
The Terapin folks (based in Germany) published a vulnerability scanner, and it
shows ok on various Ubuntu releases.
I just ran update on Proxmox nodes, it shows no updates available and stuck on OpenSSH_9.2p1,
looks like it should be OpenSSH_9.3p1.
I ran the Terapin vulnerability scanner against Proxmox paid Enterprise repository node, it says:
================================================================================
==================================== Report ====================================
================================================================================
Remote Banner: SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u1
ChaCha20-Poly1305 support: true
CBC-EtM support: false
Strict key exchange support: false
The scanned peer is VULNERABLE to Terrapin.
Note: This tool is provided as is, with no warranty whatsoever. It determines
the vulnerability of a peer by checking the supported algorithms and
support for strict key exchange. It may falsely claim a peer to be
vulnerable if the vendor supports countermeasures other than strict key
exchange.
For more details visit our website available at https://terrapin-attack.com
CVE-2023-48795
CVE-2023-46445
CVE-2023-46446
I find Ubuntu has released patches, also FreeBSD.
The Terapin folks (based in Germany) published a vulnerability scanner, and it
shows ok on various Ubuntu releases.
I just ran update on Proxmox nodes, it shows no updates available and stuck on OpenSSH_9.2p1,
looks like it should be OpenSSH_9.3p1.
I ran the Terapin vulnerability scanner against Proxmox paid Enterprise repository node, it says:
================================================================================
==================================== Report ====================================
================================================================================
Remote Banner: SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u1
ChaCha20-Poly1305 support: true
CBC-EtM support: false
Strict key exchange support: false
The scanned peer is VULNERABLE to Terrapin.
Note: This tool is provided as is, with no warranty whatsoever. It determines
the vulnerability of a peer by checking the supported algorithms and
support for strict key exchange. It may falsely claim a peer to be
vulnerable if the vendor supports countermeasures other than strict key
exchange.
For more details visit our website available at https://terrapin-attack.com