Is the recent report of an OpenSSH vulnerability, CVE-2023-48795 applicable to CA API Gateway 10.1?
The version of OpenSSH used on Gateway 10.1 is exploitable however the severity of this CVE is moderate (5.9) due to its limited impact. As you can see from the openSSH release notes, their risk assessment of the exploitability is low.
CA API Gateway 10.1
As noted in the RedHat advisory we can disable the impacted ciphers and HMAC's if they are currently enabled.
"As an alternate less invasive countermeasure, the affected cipher modes chacha20-poly1305 and any encrypt-then-mac variants (generic EtM) may be (temporarily) disabled. Some cipher modes, in particular AES-GCM, are not affected and can still be used without changes.
You can disable the following ciphers and HMACs as a workaround by updating the /etc/ssh/ssd_config file.
1. [email protected]
2. [email protected]
3. [email protected]
4. [email protected]
5. [email protected]