OpenSSH vulnerability CVE-2023-48795 impact on CA API Gateway 10.1
search cancel

OpenSSH vulnerability CVE-2023-48795 impact on CA API Gateway 10.1

book

Article ID: 280695

calendar_today

Updated On:

Products

CA API Gateway

Issue/Introduction

Is the recent report of an OpenSSH vulnerability, CVE-2023-48795 applicable to CA API Gateway 10.1? 

The version of OpenSSH used on Gateway 10.1 is exploitable however the severity of this CVE is moderate (5.9) due to its limited impact.   As you can see from the openSSH release notes, their risk assessment of the exploitability is low.

https://www.openssh.com/releasenotes.html
"While cryptographically novel, the security impact of this attack is fortunately very limited as it only allows deletion of consecutive messages, and deleting most messages at this stage of the protocol prevents user authentication from proceeding and results in a stuck connection."


Environment

CA API Gateway 10.1

Resolution

As noted in the RedHat advisory we can disable the impacted ciphers and HMAC's if they are currently enabled.

"As an alternate less invasive countermeasure, the affected cipher modes chacha20-poly1305 and any encrypt-then-mac variants (generic EtM) may be (temporarily) disabled. Some cipher modes, in particular AES-GCM, are not affected and can still be used without changes.

You can disable the following ciphers and HMACs as a workaround by updating the /etc/ssh/ssd_config file.
1. [email protected]
2. [email protected]
3. [email protected]
4. [email protected]
5. [email protected]