CVSS 3.1 Score 6.8 of 10 (medium)


Published Nov 14, 2023
Updated: Dec 22, 2023
CWE ID 639


CVE-2023-46446, also known as a "Rogue Session Attack," affects AsyncSSH before version 2.14.1. This vulnerability allows attackers to gain control over the remote end of an SSH client session by injecting or removing packets and emulating a shell. It has a risk score of 41 and a base severity rating of MEDIUM. The affected products include VrFfsQ, VrFfsR, W7NEgw, and many others. To remediate this vulnerability, users should update to AsyncSSH version 2.14.1 or newer. The potential danger it poses to organizations is high, as it can lead to unauthorized access and compromise the integrity and confidentiality of SSH client sessions.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-46446 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options