CVE-2023-48795 Vulnerability and Performing Some Mitigation Steps

CVE-2023-48795 is a vulnerability in the SSH transport protocol with certain OpenSSH extensions in OpenSSH versions prior to version 9.6 and some other products. This vulnerability could allow remote attackers to bypass integrity checks by bypassing some packets, resulting in a connection between a client and server where some security features are downgraded or disabled. CVE-2023-48795, NVD release date is 12/18/2023. The criticality level is 5.9.

We can use the scanner at as a way to find out whether this vulnerability affects our SSH servers.

You can install by following the instructions on, or you can also use the compiled binaries from the address below.

It is very easy to use.

Terrapin_Scanner_Windows_amd64.exe -connect <IP>:<Port>

As a result of a request I make to a server with a vulnerable SSH connection, the scanner tells us that this connection does not support Strict Key Exchange.

As a result of my request to a server with a vulnerable SSH connection, the scanner tells us that this connection supports Strict Key Exchange and does not contain this vulnerability.


Strict key exchange should be made mandatory or support for vulnerable algorithms should be removed. Strict key exchange is a retroactive modification that introduces sequence number resets to the SSH handshake, eliminating the attacker’s ability to inject packets during the initial unencrypted handshake.

Now, let’s perform mitigation for OpenSSH step by step. To do this, go to /etc/ssh and find the sshd_config file and go into it with nano or cat.

Then paste the relevant line into it. This line will disable the vulnerable algorithm chacha20-poly1305.

When I perform the above steps on my vulnerable SSH server, it is seen that the relevant server is no longer affected by this vulnerability after being checked with a scanner.







Leave a Reply

Your email address will not be published. Required fields are marked *