vulnerability
Red Hat JBoss EAP: CVE-2024-41909: Improper Validation of Integrity Check Value
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:H/Au:N/C:N/I:C/A:N) | Aug 12, 2024 | Sep 19, 2024 | Jun 19, 2025 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:C/A:N)
Published
Aug 12, 2024
Added
Sep 19, 2024
Modified
Jun 19, 2025
Description
Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which
some security features have been downgraded or disabled, aka a Terrapin
attack
The mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected.. A flaw was found in Apache MINA SSHD. This flaw allows an attacker who can intercept traffic between the client and server to drop certain packets from the stream. This potentially causes a Terrapin attack where the client and server consequently end up with a connection for which some security features have been downgraded or disabled.
some security features have been downgraded or disabled, aka a Terrapin
attack
The mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected.. A flaw was found in Apache MINA SSHD. This flaw allows an attacker who can intercept traffic between the client and server to drop certain packets from the stream. This potentially causes a Terrapin attack where the client and server consequently end up with a connection for which some security features have been downgraded or disabled.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CVE-2024-41909
- https://attackerkb.com/topics/CVE-2024-41909
- URL-https://access.redhat.com/security/cve/CVE-2024-41909
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2304442
- URL-https://github.com/apache/mina-sshd/issues/445
- URL-https://lists.apache.org/thread/vwf1ot8wx1njyy8n19j5j2tcnjnozt3b
- URL-https://access.redhat.com/errata/RHSA-2024:1194

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.