vulnerability
Aruba AOS-10: CVE-2023-48795: Buffer Overflow Vulnerability Allows Arbitrary Code Execution in InstantOS OpenSSH ("TerraPin" attack)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:N/I:C/A:N) | Aug 6, 2024 | Jan 14, 2025 | Jan 22, 2026 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:C/A:N)
Published
Aug 6, 2024
Added
Jan 14, 2025
Modified
Jan 22, 2026
Description
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. The impact of this vulnerability on HPE Aruba Networking Access Points has not been confirmed, but the version of OpenSSH in InstantOS and ArubaOS 10.x software has been upgraded for mitigation.
Solution
aruba-aos-10-cve-2023-48795
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.