Miggo Logo

CVE-2023-46446: AsyncSSH Rogue Session Attack

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.59697%
Published
11/9/2023
Updated
12/31/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
asyncsshpip< 2.14.12.14.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper state management in the SSH protocol state machine. Key indicators from the commit diff show:

  1. Added '_can_recv_ext_info' and '_auth_final' flags to track protocol state
  2. Modified _recv_packet to reject userauth requests when auth isn't in progress
  3. Updated _process_userauth_request to check _auth_complete and _auth_final These changes directly correlate to the vulnerability description of accepting/deferring unauthenticated requests. The original code lacked these critical state checks, allowing rogue authentication requests to be processed at incorrect protocol phases.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *n issu* in *syn*SS* v*.**.* *n* **rli*r *llows *tt**k*rs to *ontrol t** r*mot* *n* o* *n SS* *li*nt s*ssion vi* p**k*t inj**tion/r*mov*l *n* s**ll *mul*tion. ### **t*ils T** ro*u* s*ssion *tt**k t*r**ts *ny SS* *li*nt *onn**tin* to *n

Reasoning

T** vuln*r**ility st*ms *rom improp*r st*t* m*n***m*nt in t** SS* proto*ol st*t* m***in*. K*y in*i**tors *rom t** *ommit *i** s*ow: *. ***** '_**n_r**v_*xt_in*o' *n* '_*ut*_*in*l' *l**s to tr**k proto*ol st*t* *. Mo*i*i** _r**v_p**k*t to r*j**t us*r*