CVE-2023-48795 Terrapin Prefix Truncation Weakness
This KB provides guidance for customers to address reported vulnerabilities associated with the OpenSSH extension:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795
DataCore FileFly
Linux is not supported. No action is necessary.
Swarm Storage
Swarm Storage does not ship runtime images with OpenSSH in any Swarm version. No update is required.
Swarm SCS, Gateway, Elasticsearch, Telemetry
Rocky Linux 8 is not affected by this CVE.
For Red Hat (RHEL) 7 and CentOS 7, follow these steps to remediate:
To mitigate the vulnerability, remove the ChaCha20-Poly1305 cipher and CBC mode ciphers from the /etc/ssh/sshd_config
file. Update the configuration as follows:
# Ciphers and keying
Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
# MAC algorithms
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256
######VAfix - kexalgorithms##########
kexalgorithms curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
After modifying the file, save it and restart the SSH service:
sudo systemctl restart sshd
This configuration change will help mitigate the Terrapin vulnerability by removing the affected ciphers while maintaining compatibility with supported systems.
To verify the mitigation is applied download and run the following tool
curl -LO https://github.com/RUB-NDS/Terrapin-Scanner/releases/download/v1.1.3/Terrapin_Scanner_Linux_amd64
chmod +x Terrapin_Scanner_Linux_amd64
./Terrapin_Scanner_Linux_amd64 --connect <CentOS7/RHEL7 Server IP>
© DataCore Software Corporation. · https://www.datacore.com · All rights reserved.