PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-48795 Redhat CVE debrief

CVE-2023-48795, known as the Terrapin attack, is an SSH transport protocol weakness that can let a remote attacker omit some packets during extension negotiation and weaken session security. The issue affects OpenSSH before 9.6 and a wide range of SSH clients, libraries, and appliances listed in the CVE record.

Vendor
Redhat
Product
CVE-2023-48795
CVSS
MEDIUM 5.9
CISA KEV
Not listed in stored evidence
Original CVE published
2023-12-18
Original CVE updated
2026-05-12
Advisory published
2023-12-18
Advisory updated
2026-05-12

Who should care

Security teams operating SSH servers, bastion hosts, managed endpoints, automation pipelines, and embedded devices should care, especially where affected ciphers or MAC modes may be negotiated. Application owners using SSH libraries in clients, CI/CD tooling, file transfer systems, or vendor appliances should also validate their version exposure.

Technical summary

The CVE record describes a flaw in SSH transport protocol handling where certain OpenSSH extensions and SSH Binary Packet Protocol behavior mishandle handshake sequencing, allowing integrity checks to be bypassed by omitting some packets from extension negotiation. The practical impact is a connection that may have some security features downgraded or disabled. The record specifically notes effective attacks against [email protected] and, when CBC is used, the [email protected] MAC algorithms. NVD assigns CVSS 3.1 5.9/Medium with AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N and CWE-354.

Defensive priority

Medium overall, but high priority for internet-facing SSH services, administrative jump hosts, and fleets that rely on affected SSH client/server libraries or appliances. Version validation and patching should be prioritized where SSH is used for privileged access or automation.

Recommended defensive actions

  • Inventory SSH servers, clients, libraries, and appliances that may be affected by CVE-2023-48795.
  • Upgrade to fixed vendor releases, starting with OpenSSH 9.6 or the vendor-specific patched versions listed in advisories.
  • Check automation, backup, file transfer, and remote administration workflows that rely on embedded SSH libraries.
  • Review vendor guidance for any compensating controls or configuration changes that apply while patching is pending.
  • Prioritize exposed systems and privileged access paths, including bastions, jump servers, and management interfaces.
  • Monitor vendor advisories and package trackers for platform-specific remediation guidance and backports.

Evidence notes

The CVE was published on 2023-12-18 and later modified on 2026-05-12 per the supplied timeline. The official record and NVD entry describe Terrapin as an SSH transport integrity-bypass issue with broad ecosystem impact, and the reference corpus includes vendor advisories, release notes, patches, and mitigation discussions across many products. This debrief stays within the supplied CVE/NVD material and linked references, without adding exploit or reproduction details.

Official resources

Publicly disclosed in the CVE record on 2023-12-18. The supplied NVD source item shows a later modification on 2026-05-12. This debrief is based on the official CVE/NVD record and linked advisories only.