...
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2023-48795 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795 The affected third-party software component has been upgraded to a version that includes fixes for the vulnerability. Future versions of the product(s) will not be affected by this vulnerability. Security researchers at Ruhr University Bochum on 18 December 2023 disclosed a protocol level vulnerability which has been assigned a CVE ID of CVE-2023-48795 and was named 'Terrapin Attack'. The NX-OS Software uses CiscoSSH which is derived from OpenSSH and could be vulnerable to CVE-2023-48795 but the Security Impact Rating (SIR) is Low because the security impact of this attack very limited as it only allows deletion of consecutive messages, and deleting most messages at this stage of the protocol prevents user authentication from proceeding. In addition: • The attacker needs to be on a privileged position and be able to intercept and modify the SSH initial session setup packet exchange, and • The SSH server must either (only one is enough) * Offer the chacha20-poly1305@openssh.com as an encryption algorithm or * Using an encryption algorithm in CBC mode *and* an -etm@openssh.com hashing algorithm
Device with default configuration. The NX-OS Software does not run AsyncSSH and are not vulnerable to either: * CVE-2023-46445 (Rogue Extension Negotiation) * CVE-2023-46446 (Rogue Session Attack)
If the above conditions are true, disabling the vulnerable combinations would be an effective workaround.
Additional details about the vulnerabilities listed above can be found at https://www.cve.org/. *PSIRT Evaluation:* The Cisco PSIRT has assigned this bug the following CVSS version 3.1 score. The Base CVSS score as of the time of evaluation is: 5.9 https://tools.cisco.com/security/center/cvssCalculator.x?version=3.1&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVE ID CVE-2023-48795 have been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html