First published: Thu Mar 16 2023(Updated: )
russh is a Rust SSH client and server library. Starting in version 0.34.0 and prior to versions 0.36.2 and 0.37.1, Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality. Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping. Most other implementations reject such keys, so this is mainly an interoperability issue in such a case. This issue is fixed in versions 0.36.2 and 0.37.1
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Russh Project Russh Rust | >=0.34.0<0.36.2 | |
Russh Project Russh Rust | =0.37.0 | |
Russh Project Russh Rust | =0.37.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-28113.
The severity of CVE-2023-28113 is medium with a severity value of 5.9.
The Russh project Russh versions 0.34.0 to 0.36.2 and version 0.37.0-beta1 are affected by CVE-2023-28113.
CVE-2023-28113 can lead to insecure shared secrets and break confidentiality in connections between a russh client and server.
You can find more information about CVE-2023-28113 at the following references: [Link 1](https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L72-L76), [Link 2](https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L78-L81), [Link 3](https://github.com/warp-tech/russh/commit/d831a3716d3719dc76f091fcea9d94bd4ef97c6e).