Description
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
References (8)
Core 8
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
Third Party Advisory x_refsource_misc
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20200709-0004/
Mailing List, Patch, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2020/12/02/1
Patch, Third Party Advisory x_refsource_misc
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
Third Party Advisory x_refsource_misc
https://docs.ssh-mitm.at/CVE-2020-14145.html
Third Party Advisory x_refsource_misc
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202105-35
Scores
CVSS v3
5.9
EPSS
0.0156
EPSS Percentile
81.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-203
Status
published
Products (12)
netapp/active_iq_unified_manager
9.5
netapp/aff_a700s_firmware
netapp/hci_compute_node
netapp/hci_management_node
netapp/hci_storage_node
netapp/ontap_select_deploy_administration_utility
netapp/solidfire
netapp/steelstore_cloud_integrated_storage
openbsd/openssh
8.4
openbsd/openssh
8.5
... and 2 more
Published
Jun 29, 2020
Tracked Since
Feb 18, 2026