๐Ÿ” CVE Alert

CVE-2023-46446

MEDIUM 6.8
CVSS Score
6.8
EPSS Score
0.0%
EPSS Percentile
0th

An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."

Vendor n/a
Product n/a
Published Nov 14, 2023
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for n/a n/a

Be the first to know when new medium vulnerabilities affecting n/a n/a are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

n/a / n/a
n/a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ME34ROZWMDK5KLMZKTSA422XVJZ7IMTE/ terrapin-attack.com: https://www.terrapin-attack.com github.com: https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst github.com: https://github.com/advisories/GHSA-c35q-ffpf-5qpm packetstormsecurity.com: http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html security.netapp.com: https://security.netapp.com/advisory/ntap-20231222-0001/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html