CVE-2023-28113

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28113
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28113.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-28113
Aliases
Published
2023-03-16T00:00:00Z
Modified
2025-11-23T18:11:36.699912Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
russh may use insecure Diffie-Hellman keys
Details

russh is a Rust SSH client and server library. Starting in version 0.34.0 and prior to versions 0.36.2 and 0.37.1, Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality. Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping. Most other implementations reject such keys, so this is mainly an interoperability issue in such a case. This issue is fixed in versions 0.36.2 and 0.37.1

Database specific
{
    "cwe_ids": [
        "CWE-20",
        "CWE-358"
    ]
}
References

Affected packages

Git / github.com/eugeny/russh

Affected ranges

Type
GIT
Repo
https://github.com/eugeny/russh
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Fixed

Affected versions

0.*

0.37.0-beta.1

v0.*

v0.34.0
v0.35.0-beta.1
v0.35.0-beta.2
v0.35.0-beta.3
v0.35.0-beta.5
v0.35.0-beta.6
v0.35.0-beta.7
v0.35.0-beta.8
v0.35.0-beta.9
v0.36.0
v0.36.1
v0.37.0
v0.37.0-beta.1

Git / github.com/warp-tech/russh

Affected ranges

Type
GIT
Repo
https://github.com/warp-tech/russh
Events

Affected versions

v0.*

v0.34.0
v0.35.0-beta.1
v0.35.0-beta.2
v0.35.0-beta.3
v0.35.0-beta.5
v0.35.0-beta.6
v0.35.0-beta.7
v0.35.0-beta.8
v0.35.0-beta.9
v0.36.0
v0.36.1