CVE-2020-14145
29.06.2020, 18:15
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.Enginsight
Vendor | Product | Version |
---|---|---|
openbsd | openssh | 5.7 ≤ 𝑥 < 8.4 |
openbsd | openssh | 8.4 |
openbsd | openssh | 8.5 |
openbsd | openssh | 8.6 |
netapp | aff_a700s_firmware | - |
netapp | active_iq_unified_manager | 9.5 ≤ |
netapp | hci_management_node | - |
netapp | ontap_select_deploy_administration_utility | - |
netapp | solidfire | - |
netapp | steelstore_cloud_integrated_storage | - |
netapp | hci_compute_node | - |
netapp | hci_storage_node | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openssh |
| ||||||||||||||||||||||||
openssh-ssh1 |
|
References