Vulnerability Name:

CCN-9652

Published:2002-07-22
Updated:2002-07-22
Summary:SSH (Secure Shell) is vulnerable to a man-in-the-middle attack.

When a connection is established by an SSH client, the SSH server's hostkey is recorded by the client and is used to verify future connections with that server. If the hostkey is ever changed, the user is given a warning message before connecting, indicating the possibility of an attack. However, if a client attempts to connect to a known server, but the server presents a banner that indicates a different SSH protocol version than what has previously been used, a new hostkey is presented for that version number but the warning message is not displayed. The user is then presented a new key and asked if they would like to continue.

A remote attacker with control over an SSH server could use this vulnerability to launch man-in-the-middle attacks against vulnerable clients, with a reduced possibility of being detected.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Mon Jul 22 2002 - 18:43:41 CDT
SSH Protocol Trick

Source: CCN
Type: BugTraq Mailing List, Tue Jul 23 2002 - 07:47:39 CDT
Re: SSH Protocol Trick

Source: CCN
Type: BugTraq Mailing List, Tue Jul 23 2002 - 15:46:48 CDT
Re: SSH Protocol Trick

Source: CCN
Type: OpenSSH Web site
OpenSSH

Source: CCN
Type: BID-5284
Multiple SSH Client Protocol Change Default Warning Weakness

Source: CCN
Type: SSH Communications Security Web site
SSH - Products

Source: XF
Type: UNKNOWN
ssh-protocol-change-mitm(9652)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:openbsd:openssh:2.1.1:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.5.2:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.5.1:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.9:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.0:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.4:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.1:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:3.3:-:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.3:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:openssh:2.9.9:-:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    openbsd openssh 2.1.1
    openbsd openssh 2.5.2
    openbsd openssh 2.5
    openbsd openssh 2.5.1
    openbsd openssh 2.9
    openbsd openssh 3.0
    openbsd openssh 3.2.2p1
    openbsd openssh 3.4p1
    openbsd openssh 3.4
    openbsd openssh 3.0p1
    openbsd openssh 3.0.1p1
    openbsd openssh 3.0.1
    openbsd openssh 3.0.2p1
    openbsd openssh 3.0.2
    openbsd openssh 3.1p1
    openbsd openssh 3.1
    openbsd openssh 3.2
    openbsd openssh 3.2.3p1
    openbsd openssh 3.3p1
    openbsd openssh 3.3
    openbsd openssh 2.1
    openbsd openssh 2.2
    openbsd openssh 2.3
    openbsd openssh 2.9p2
    openbsd openssh 2.9p1
    openbsd openssh 2.9.9
    ssh ssh2 2.0.1
    ssh ssh2 2.0.10
    ssh ssh2 2.0.11
    ssh ssh2 2.0.12
    ssh ssh2 2.0.2
    ssh ssh2 2.0.3
    ssh ssh2 2.0.4
    ssh ssh2 2.0.5
    ssh ssh2 2.0.6
    ssh ssh2 2.0.7
    ssh ssh2 2.0.8
    ssh ssh2 2.0.9