CVE-2020-14145

MEDIUM

Openbsd Openssh < 8.4 - Information Disclosure

Title source: rule
STIX 2.1

Description

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

References (8)

Core 8
Core References
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20200709-0004/
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2020/12/02/1
Third Party Advisory x_refsource_misc
https://docs.ssh-mitm.at/CVE-2020-14145.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202105-35

Scores

CVSS v3 5.9
EPSS 0.0156
EPSS Percentile 81.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-203
Status published
Products (12)
netapp/active_iq_unified_manager 9.5
netapp/aff_a700s_firmware
netapp/hci_compute_node
netapp/hci_management_node
netapp/hci_storage_node
netapp/ontap_select_deploy_administration_utility
netapp/solidfire
netapp/steelstore_cloud_integrated_storage
openbsd/openssh 8.4
openbsd/openssh 8.5
... and 2 more
Published Jun 29, 2020
Tracked Since Feb 18, 2026