HomeOpenbsdCVE-2020-14145

CVE-2020-14145

MEDIUM
5.9CVSS
Published: 2020-06-29
Updated: 2025-12-18
AI Analysis

Description

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
none
Availability
none
Weaknesses
CWE-203CWE-203

Metadata

Primary Vendor
OPENBSD
Published
6/29/2020
Last Modified
12/18/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

openbsd : opensshopenbsd : opensshopenbsd : opensshopenbsd : opensshnetapp : aff_a700s_firmwarenetapp : active_iq_unified_managernetapp : hci_management_nodenetapp : ontap_select_deploy_administration_utilitynetapp : solidfirenetapp : steelstore_cloud_integrated_storagenetapp : hci_compute_nodenetapp : hci_storage_node

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief