Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » New Terrapin flaw could allow attackers to reduce SSH protocol security
    Cyber Security

    New Terrapin flaw could allow attackers to reduce SSH protocol security

    techempireBy techempireNo Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 1, 2024Editorial DepartmentEncryption/Internet Security

    SSH protocol security

    Security researchers at Ruhr-University Bochum have discovered a vulnerability in the Secure Shell (SSH) encrypted network protocol that could allow an attacker to reduce the security of the connection by compromising the integrity of the secure channel.

    is called eel (CVE-2023-48795, CVSS score: 5.9), the vulnerability is described as “the first ever actually exploitable prefix truncation attack.”

    Say researchers Fabian Bäumer, Marcus Brinkmann and Jörg Schwenk.

    Internet security

    SSH is a method of securely sending commands to a computer over an unsecured network. It relies on encryption technology to authenticate and encrypt connections between devices.

    This is accomplished through a handshake, in which the client and server agree on cryptographic primitives and exchange the keys required to establish a secure channel that provides confidentiality and integrity guarantees.

    However, when SSH extension negotiation is used, the security of an SSH connection can be reduced by a bad actor in the position of an Active Adversary in the Middle (AitM), capable of intercepting and modifying traffic on the TCP/IP layer connection.

    “This attack can be carried out in practice, allowing an attacker to reduce the security of the connection by truncating the extended negotiation message (RFC8308) in the record,” the researchers explained.

    “Truncation may result in the use of less secure client authentication algorithms and disable specific countermeasures against keystroke timing attacks in OpenSSH 9.5.”

    Another key prerequisite for launching an attack is to secure the connection using a vulnerable encryption mode such as ChaCha20-Poly1305 or CBC with Encrypt-then-MAC.

    “In a real-world scenario, an attacker could exploit this vulnerability to intercept sensitive data or use administrator privileged access to take control of critical systems,” Qualys said. “For organizations with large interconnected networks that provide privileged data access, this The risk is particularly serious.”

    Internet security

    This flaw affects many SSH client and server implementations, such as OpenSSH, Paramiko, PuTTY, KiTTY, WinSCP, libssh, libssh2, AsyncSSH, FileZilla, and Dropbear, prompting maintainers to release patches to mitigate potential risks.

    “Because SSH servers, especially OpenSSH, are so commonly used in cloud-based enterprise application environments, companies must ensure they take appropriate steps to patch their servers,” said Yair Mizrahi, senior security researcher at JFrog Security Research. The Hacker News .

    “However, a vulnerable client connecting to a patched server will still render the connection vulnerable. Therefore, companies must also take steps to identify every vulnerable situation across the entire infrastructure and apply mitigation immediately measure. “

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.