{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T18:19:53.729","vulnerabilities":[{"cve":{"id":"CVE-2024-41909","sourceIdentifier":"security@apache.org","published":"2024-08-12T16:15:15.533","lastModified":"2025-03-27T16:15:26.870","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which \nsome security features have been downgraded or disabled, aka a Terrapin \nattack\n\nThe mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected."},{"lang":"es","value":"Como muchas otras implementaciones de SSH, Apache MINA SSHD sufrió el problema más conocido como CVE-2023-48795. Un atacante que pueda interceptar el tráfico entre el cliente y el servidor podría descartar ciertos paquetes de la transmisión, lo que podría provocar que el cliente y el servidor terminen con una conexión en la que algunas funciones de seguridad se hayan degradado o desactivado, también conocido como un ataque Terrapin. Las mitigaciones para evitar esto. tipo de ataque fueron implementados en Apache MINA SSHD 2.12.0, tanto del lado del cliente como del servidor. Se recomienda a los usuarios actualizar al menos a esta versión. Tenga en cuenta que tanto la implementación del cliente como del servidor deben tener mitigaciones aplicadas contra este problema; de lo contrario, la conexión aún puede verse afectada."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-354"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:mina_sshd:*:*:*:*:*:*:*:*","versionEndIncluding":"2.11.0","matchCriteriaId":"5F6C877D-CDBB-4A97-AEDD-A4FDF46259D7"}]}]}],"references":[{"url":"https://github.com/apache/mina-sshd/issues/445","source":"security@apache.org","tags":["Issue Tracking"]},{"url":"https://lists.apache.org/thread/vwf1ot8wx1njyy8n19j5j2tcnjnozt3b","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20241011-0006/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}