CVE-2020-14145

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
VendorProductVersion
openbsdopenssh
5.7 ≤
𝑥
< 8.4
openbsdopenssh
8.4
openbsdopenssh
8.5
openbsdopenssh
8.6
netappaff_a700s_firmware
-
netappactive_iq_unified_manager
9.5 ≤
netapphci_management_node
-
netappontap_select_deploy_administration_utility
-
netappsolidfire
-
netappsteelstore_cloud_integrated_storage
-
netapphci_compute_node
-
netapphci_storage_node
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssh
bullseye (security)
unimportant
bullseye
unimportant
bookworm
unimportant
bookworm (security)
unimportant
sid
unimportant
trixie
unimportant
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssh
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
ignored
impish
ignored
hirsute
ignored
groovy
ignored
focal
ignored
eoan
ignored
bionic
ignored
xenial
ignored
trusty
ignored
openssh-ssh1
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
ignored
impish
ignored
hirsute
ignored
groovy
ignored
focal
ignored
eoan
ignored
bionic
ignored
xenial
dne
trusty
dne