PatchSiren cyber security CVE debrief
CVE-2023-48795 Redhat CVE debrief
CVE-2023-48795, known as the Terrapin attack, is an SSH transport protocol weakness that can let a remote attacker omit some packets during extension negotiation and weaken session security. The issue affects OpenSSH before 9.6 and a wide range of SSH clients, libraries, and appliances listed in the CVE record.
- Vendor
- Redhat
- Product
- CVE-2023-48795
- CVSS
- MEDIUM 5.9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-12-18
- Original CVE updated
- 2026-05-12
- Advisory published
- 2023-12-18
- Advisory updated
- 2026-05-12
Who should care
Security teams operating SSH servers, bastion hosts, managed endpoints, automation pipelines, and embedded devices should care, especially where affected ciphers or MAC modes may be negotiated. Application owners using SSH libraries in clients, CI/CD tooling, file transfer systems, or vendor appliances should also validate their version exposure.
Technical summary
The CVE record describes a flaw in SSH transport protocol handling where certain OpenSSH extensions and SSH Binary Packet Protocol behavior mishandle handshake sequencing, allowing integrity checks to be bypassed by omitting some packets from extension negotiation. The practical impact is a connection that may have some security features downgraded or disabled. The record specifically notes effective attacks against [email protected] and, when CBC is used, the [email protected] MAC algorithms. NVD assigns CVSS 3.1 5.9/Medium with AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N and CWE-354.
Defensive priority
Medium overall, but high priority for internet-facing SSH services, administrative jump hosts, and fleets that rely on affected SSH client/server libraries or appliances. Version validation and patching should be prioritized where SSH is used for privileged access or automation.
Recommended defensive actions
- Inventory SSH servers, clients, libraries, and appliances that may be affected by CVE-2023-48795.
- Upgrade to fixed vendor releases, starting with OpenSSH 9.6 or the vendor-specific patched versions listed in advisories.
- Check automation, backup, file transfer, and remote administration workflows that rely on embedded SSH libraries.
- Review vendor guidance for any compensating controls or configuration changes that apply while patching is pending.
- Prioritize exposed systems and privileged access paths, including bastions, jump servers, and management interfaces.
- Monitor vendor advisories and package trackers for platform-specific remediation guidance and backports.
Evidence notes
The CVE was published on 2023-12-18 and later modified on 2026-05-12 per the supplied timeline. The official record and NVD entry describe Terrapin as an SSH transport integrity-bypass issue with broad ecosystem impact, and the reference corpus includes vendor advisories, release notes, patches, and mitigation discussions across many products. This debrief stays within the supplied CVE/NVD material and linked references, without adding exploit or reproduction details.
Official resources
-
CVE-2023-48795 CVE record
CVE.org
-
CVE-2023-48795 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Source reference
[email protected] - Mailing List
-
Source reference
[email protected] - Mailing List
-
Mitigation or vendor reference
[email protected] - Mailing List, Mitigation
-
Source reference
[email protected] - Mailing List
-
Source reference
[email protected] - Mailing List
Publicly disclosed in the CVE record on 2023-12-18. The supplied NVD source item shows a later modification on 2026-05-12. This debrief is based on the official CVE/NVD record and linked advisories only.