SpanVA SSH Prefix Truncation Vulnerability (Terrapin)
book
Article ID: 282471
calendar_today
Updated On: 04-24-2024
Products
CASB Gateway Advanced
CASB Advanced Threat Protection
CASB Audit
CASB Gateway
CASB Security Advanced
CASB Security Advanced IAAS
CASB Security Premium
CASB Security Premium IAAS
CASB Security Standard
CASB Securlet IAAS
CASB Securlet SAAS
CASB Securlet SAAS With DLP-CDS
Issue/Introduction
Issue: SpanVA Appliance Vulnerability found during Qualys Network Scan
CVE-2023-48795 - SSH Prefix Truncation Vulnerability (Terrapin).
SpanVA is on latest version 1,15.3.151.0-8rc dated 29 March 2023
Resolution
Based on the available literature, we have concluded the Terrapin attack does not pose any practical risk to the SpanVA appliance.
However, we are in the process of upgrading OpenSSH shipped with SpanVA to address the issue (Release date TBD).
If the customer is anxious, here is a temporary workaround:
- Browse to the Settings page, "Strict Ciphers" section on SpanVA
- Select "Custom" for "Use Only Strict SSH Ciphers?"
- Only select AES128_CTR, AES192_CTR, AES256_CTR, AES128_GCM@OPENSSH.COM, AES256_GCM@OPENSSH.COM
- Click on "Save"
- Rescan SpanVA for vulnerability - should be gone.
Feedback
thumb_up
Yes
thumb_down
No