Description
An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3899-1 | python-asyncssh security update |
Github GHSA |
GHSA-c35q-ffpf-5qpm | AsyncSSH Rogue Session Attack |
Ubuntu USN |
USN-7108-1 | AsyncSSH vulnerabilities |
Ubuntu USN |
USN-7108-2 | AsyncSSH vulnerabilities |
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 08 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat ceph Storage |
|
| CPEs | cpe:/a:redhat:ceph_storage:7.1::el8 | |
| Vendors & Products |
Redhat
Redhat ceph Storage |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-25T17:20:12.786Z
Reserved: 2023-10-23T00:00:00.000Z
Link: CVE-2023-46446
No data.
Status : Modified
Published: 2023-11-14T03:15:09.573
Modified: 2026-02-25T18:18:07.347
Link: CVE-2023-46446
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN