๐Ÿ” CVE Alert

CVE-2026-44467

UNKNOWN 0.0

Claude Desktop: SSH Host Key Verification Bypass Allows Man-in-the-Middle Attack on Remote Sessions

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

The Claude Desktop app gives you Claude Code with a graphical interface built for running multiple sessions side by side. From 1.2581.0 to before 1.4304.0, Claude Desktop's SSH remote development feature verified only whether a hostname existed in ~/.ssh/known_hosts without comparing the server's presented host key against the stored key. This allowed a network-positioned attacker to present an arbitrary SSH host key and have the connection silently accepted, enabling a man-in-the-middle attack on remote development sessions. Successful exploitation required the attacker to be in a network position to intercept SSH traffic (e.g., via ARP spoofing, rogue Wi-Fi, or DNS poisoning) and the target hostname to already have an entry in the victim's known_hosts file. This vulnerability is fixed in 1.4304.0.

CWE CWE-297 CWE-322
Vendor anthropics
Product claude-code
Published May 13, 2026
Stay Ahead of the Next One

Get instant alerts for anthropics claude-code

Be the first to know when new unknown vulnerabilities affecting anthropics claude-code are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

anthropics / claude-code
>= 1.2581.0, < 1.4304.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/anthropics/claude-code/security/advisories/GHSA-3rwf-2g6p-c2f9