First published: Mon Aug 12 2024(Updated: )
Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack The mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.sshd:sshd-common | <2.12.0 | 2.12.0 |
Apache MINA | <=2.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41909 is classified as a medium severity vulnerability due to its potential for exploitation through traffic interception.
To fix CVE-2024-41909, upgrade to Apache MINA SSHD version 2.12.0 or later.
The potential impacts of CVE-2024-41909 include disrupted communication between SSH clients and servers due to packet interception.
Apache MINA versions prior to 2.12.0 are affected by CVE-2024-41909.
Yes, CVE-2024-41909 is related to CVE-2023-48795, indicating similar weaknesses in SSH implementations.