{
  "threat_severity" : "Moderate",
  "public_date" : "2023-11-13T00:00:00Z",
  "bugzilla" : {
    "description" : "python-asyncssh: Rogue Session Attack",
    "id" : "2250329",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2250329"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-372",
  "details" : [ "An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a \"Rogue Session Attack.\"", "A flaw was found in python-synch before the 2.14.1 versions, where the client can log in to the attacker's account without the client being able to detect this. This flaw allows an attacker to control the remote end of the SSH session completely, resulting in a complete break of the confidentiality and integrity of the secure channel, which could cause more issues depending on the application logic implemented by the AsyncSSH server." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Ceph Storage 7.1",
    "release_date" : "2025-05-07T00:00:00Z",
    "advisory" : "RHSA-2025:4664",
    "cpe" : "cpe:/a:redhat:ceph_storage:7.1::el8",
    "package" : "ceph-2:18.2.1-329.el8cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 7.1",
    "release_date" : "2025-05-07T00:00:00Z",
    "advisory" : "RHSA-2025:4664",
    "cpe" : "cpe:/a:redhat:ceph_storage:7.1::el8",
    "package" : "oath-toolkit-0:2.6.12-1.el8cp"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Ceph Storage 6",
    "fix_state" : "Affected",
    "package_name" : "python-asyncssh",
    "cpe" : "cpe:/a:redhat:ceph_storage:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-46446\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-46446\nhttps://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm" ],
  "name" : "CVE-2023-46446",
  "csaw" : false
}