CVE-2023-28113

russh is a Rust SSH client and server library. Starting in version 0.34.0 and prior to versions 0.36.2 and 0.37.1, Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality. Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping. Most other implementations reject such keys, so this is mainly an interoperability issue in such a case. This issue is fixed in versions 0.36.2 and 0.37.1
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*
cpe:2.3:a:russh_project:russh:0.37.0:-:*:*:*:rust:*:*
cpe:2.3:a:russh_project:russh:0.37.0:beta1:*:*:*:rust:*:*

History

No history.

Information

Published : 2023-03-16 21:15

Updated : 2024-02-28 19:51


NVD link : CVE-2023-28113

Mitre link : CVE-2023-28113

CVE.ORG link : CVE-2023-28113


JSON object : View

Products Affected

russh_project

  • russh
CWE
CWE-347

Improper Verification of Cryptographic Signature

CWE-20

Improper Input Validation

CWE-358

Improperly Implemented Security Check for Standard