Skip to main content
Hitachi Vantara Knowledge

Terrapin Attack: CVE-2023-48795

Priority: Medium (CVSS score: 5.9)

Status: In Progress

 

First Published: March 15, 2024

Advisory Version: 1.2

References: CVE-2023-48795

 

Summary

CVE-2023-48795 describes a vulnerability in OpenSSH v9.5 and earlier. This vulnerability, also known as the "Terrapin attack", could allow an attacker to downgrade the security of an SSH connection by manipulating information transferred during the the connection's initial handshake/negotiation sequence. The attacker must have already gained access to the local network, and must be able to both intercept communications and assume the identity of both the recipient and the sender. The CVSS 3.x rating of "Medium" reflects the difficulty in successfully exploiting this vulnerability.

CVE-2023-48795 has since been resolved in OpenSSH v9.6. It's mitigation requires both client and server implementations to be upgraded to this fixed or later version. Additionally, this vulnerability can also be addressed by disabling use of the "ChaCha20-Poly1305" cipher in affected OpenSSH implementations. 

More information about CVE-2023-48795 is available here:

* OpenSSH v9.6 Release Notes

 

Affected Products

Vulnerable Products

The following matrix lists Hitachi Vantara products and solutions which have been confirmed to be affected by CVE-2023-48795 . If a Fixed Release Version is accompanied by a future date, the date is the best estimate we can provide based on current information and mitigation testing progress. If no Fixed Release Version is indicated for an affected product, Hitachi Vantara is continuing to evaluate the fix, and will update this advisory as additional information becomes available.

NOTE: Cited product documentation, including product-specific Alerts and Technical Bulletins, are available to Hitachi Vantara customers logged into Support Connect.

Product Notes
Storage Products
HM850 / HM900 GUM
(Built-in CLI)
CVE-2023-48795:  Vulnerable.  Vulnerability can be mitigated by disabling the "ChaCha20-Poly1305" cipher on the SSH client. Permanent fix schedule TBD.
Software Products
Hitachi Remote Ops Monitor Agent CVE-2023-48795:  Vulnerable as strict key exchange is currently not implemented. Vulnerability can be mitigated by disabling the "ChaCha20-Poly1305" cipher on the device being monitored by HRO Monitor Agent.
Hitachi Ops Center Administrator CVE-2023-48795:  Vulnerable.  Permanent fixed version GA target late March / early April 2024
Hitachi Virtual Storage System Block  (VSSB) CVE-2023-48795: Vulnerable. Vulnerability can be mitigated by disabling the "ChaCha20-Poly1305" cipher on the client that connects to the Maintenance Node. Permanent fixed version GA target TBD
Content Products
Hitachi Data Ingestor (HDI) CVE-2023-48795: HDI OS is Vulnerable if the SSH client implements the "ChaCha20-Poly1305" cipher and prioritizes its use over AES variants. Vulnerability can be mitigated by disabling the "ChaCha20-Poly1305" cipher on the affected SSH client. Permanent fixed version GA target TBD.
Network Attached Storage
Hitachi Network Attached Storage (HNAS) CVE-2023-48795:  Vulnerable as strict key exchange is currently not implemented. Vulnerability can be mitigated by disabling the "ChaCha20-Poly1305" cipher.

Products Confirmed Not Vulnerable

* As this is an ongoing investigation across all Hitachi Vantara product lines, please note that products may be reclassified as vulnerable as they continue to be evaluated for risk as additional information pertaining to CVE-2023-48795 is released.

Product Notes
Storage Products
Hitachi Virtual Storage Platform VSP E990, VSP E790, VSP E590 CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform VSP G130, F/G350, VSP F/G370, VSP F/G700, VSP F/G900 CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform VSP G200, VSP F/G/N400, VSP F/G/N600, VSP F/G/N800 CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform VSP 5100,  VSP 5100H,  VSP 5500, VSP 5500H
(VSP 5x00) RAID 900
CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform VSP 5200,  VSP 5200H,  VSP 5600, VSP 5600H
(VSP 5x00) RAID 900
CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform G1000, F/G1500
(VSP F/G1x00) RAID 800
CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform (VSP) RAID 700 CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Unified Storage VM (HUS VM) HM700 CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Adaptable Modular Storage DF800S, DF800M, DF800H (AMS 2x00) CVE-2023-48795: Not vulnerable. Affected components not used
Hitachi Unified Storage DF850XS, DF850S, DF850MH (HUS 1x0) CVE-2023-48795: Not vulnerable. Affected components not used
Software Products
Hitachi Remote Ops
SVP Agent
CVE-2023-48795: Not vulnerable. Affected components not used

 

Recommended Actions

Please continue to check this Security Advisory, as new information will be added to it as it becomes available.

 

If any of the information presented above remains unclear, please contact the Hitachi Vantara Global Support Center, or your Vantara-authorized service and support provider.

The information contained herein is for informational purposes only. It is not intended as a guaranty or warranty about Hitachi Vantara’s products, including any guaranty or warranty that any product cannot be exploited by third parties. All product warranties and obligations to a customer must be specified in a mutually acceptable and executed contract between the parties.