Description
The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0819 | The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism. |
Github GHSA |
GHSA-xhjq-w7xm-p8qj | golang.org/x/crypto/ssh Man-in-the-Middle attack |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T14:16:28.305Z
Reserved: 2016-12-05T00:00:00.000Z
Link: CVE-2017-3204
No data.
Status : Modified
Published: 2017-04-04T14:59:00.180
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-3204
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA