<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5282580#M1120635</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1867909"&gt;@venkatakrishnareddy-maram&lt;/a&gt;&amp;nbsp; &amp;nbsp;Contact Cisco TAC to get that sorted out (which versions are really fixed)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;If you want to test for this vulnerability ; have a look at&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;A href="https://github.com/RUB-NDS/Terrapin-Scanner" target="_blank"&gt;https://github.com/RUB-NDS/Terrapin-Scanner&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Apr 2025 06:16:23 GMT</pubDate>
    <dc:creator>Mark Elsen</dc:creator>
    <dc:date>2025-04-18T06:16:23Z</dc:date>
    <item>
      <title>SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5221378#M1117398</link>
      <description>&lt;H1&gt;&lt;FONT size="4"&gt;SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795) in cisco Catalyst 9300&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;We have run &lt;SPAN class=""&gt;vulnerability&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT size="4"&gt;cisco Catalyst 9300&lt;SPAN&gt;&amp;nbsp; and we find the above&amp;nbsp; &lt;SPAN class=""&gt;vulnerability. All software is up to date.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;#show ip ssh&lt;BR /&gt;SSH Enabled - version 2.0&lt;BR /&gt;Authentication methods:publickey,keyboard-interactive,password&lt;BR /&gt;Authentication Publickey Algorithms:ssh-rsa,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,rsa-sha2-256,rsa-sha2-512,x509v3-rsa2048-sha256&lt;BR /&gt;Hostkey Algorithms:rsa-sha2-512,rsa-sha2-256,ssh-rsa&lt;BR /&gt;Encryption Algorithms:chacha20-poly1305@openssh.com,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-gcm,aes256-gcm,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;MAC Algorithms:hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com&lt;BR /&gt;KEX Algorithms:curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512&lt;BR /&gt;Authentication timeout: 60 secs; Authentication retries: 2&lt;BR /&gt;Minimum expected Diffie Hellman key size : 2048 bits&lt;BR /&gt;IOS Keys in SECSH format(ssh-rsa, base64 encoded): TP-self-signed-1724981029&lt;BR /&gt;Modulus Size : 2048 bits&lt;BR /&gt;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9AhvuJYMMw390tNL30RGLuDac6Sic5NgxwBbJYgUA&lt;BR /&gt;FXfh1P6UVSIpGD9QSgJolIDcyAXiB8k0YA6YkC/pyuaFE7Fi61o7xtpMmtRWa/WC4FwdX647GC23adLr&lt;BR /&gt;KL5NR38+GOKcNHPTDgsKmXyuTytfsGJ3a+15DF7fb2iF4L8neo3WzhQ/1yokkcNGolcFJwLsm4RLx1nY&lt;BR /&gt;yU/68VOSHsD2NEJjZMIlzSkkRYNjaz9RLNtzjDFpg5/DaqJ3X2rWoGskaQaszlaw+OrI3T5bbB+R2OuN&lt;BR /&gt;umK3Bc16KZd1/zSGg2SCzDGODp0oVP4JIYG+iOjZX0+BoGcqftbxKUQnh50t&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advances&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 09:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5221378#M1117398</guid>
      <dc:creator>Minato</dc:creator>
      <dc:date>2024-11-07T09:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5221473#M1117401</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- How do you define &lt;U&gt;&lt;EM&gt;'&lt;/EM&gt;&lt;/U&gt;&lt;SPAN&gt;&lt;U&gt;&lt;EM&gt;All software is up to date&lt;/EM&gt;&lt;/U&gt;.' ; meaning what is the current software version installed on the 9300 ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 12:50:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5221473#M1117401</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-11-07T12:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5221475#M1117402</link>
      <description>&lt;P&gt;Cisco IOS XE Software, Version 17.14.01&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 12:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5221475#M1117402</guid>
      <dc:creator>Minato</dc:creator>
      <dc:date>2024-11-07T12:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5221477#M1117403</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - This bug report&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwj31317" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwj31317&lt;/A&gt;&amp;nbsp;mentions &lt;STRONG&gt;17.15.1&lt;/STRONG&gt; as a fixed release ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 12:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5221477#M1117403</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-11-07T12:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5282379#M1120631</link>
      <description>&lt;P&gt;We have recently upgraded our catalyst 93xx/94xx boxes to 17.12.04 but Qualys still detects that the vulnerability is ON. Wondering if this is fixed in 17.12.4 or skipped for future releases??&lt;/P&gt;&lt;P&gt;If it is fixed, is there anyway we can validate it on the box please?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 15:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5282379#M1120631</guid>
      <dc:creator>venkatakrishnareddy-maram</dc:creator>
      <dc:date>2025-04-17T15:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5282580#M1120635</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1867909"&gt;@venkatakrishnareddy-maram&lt;/a&gt;&amp;nbsp; &amp;nbsp;Contact Cisco TAC to get that sorted out (which versions are really fixed)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;If you want to test for this vulnerability ; have a look at&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;A href="https://github.com/RUB-NDS/Terrapin-Scanner" target="_blank"&gt;https://github.com/RUB-NDS/Terrapin-Scanner&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Apr 2025 06:16:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5282580#M1120635</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2025-04-18T06:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5283917#M1120684</link>
      <description>&lt;P&gt;I have tested (upgraded to 17.12.04) locally and do see that we still have OpenSSH version as 7.4&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch#guestshell run bash&lt;/P&gt;&lt;P class=""&gt;[guestshell@guestshell ~]$ ssh -V&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;OpenSSH_7.4p1,&lt;/STRONG&gt; OpenSSL 1.0.2k-fips&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;26 Jan 2017&lt;/P&gt;&lt;P class=""&gt;[guestshell@guestshell ~]$&lt;/P&gt;&lt;P class=""&gt;and still seeing&amp;nbsp;&lt;A href="mailto:chacha20-poly1305@openssh.com" target="_blank" rel="noopener"&gt;chacha20-poly1305&lt;/A&gt;&amp;nbsp;and our Qualys tracking it too with&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Strict Key Exchange is not enabled.&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Switch#sh ip ssh&lt;/P&gt;&lt;P class=""&gt;SSH Enabled - version 2.0&lt;/P&gt;&lt;P class=""&gt;Authentication methods:publickey,keyboard-interactive,password&lt;/P&gt;&lt;P class=""&gt;Authentication Publickey Algorithms:ssh-rsa,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,rsa-sha2-256,rsa-sha2-512,x509v3-rsa2048-sha256&lt;/P&gt;&lt;P class=""&gt;Hostkey Algorithms:rsa-sha2-512,rsa-sha2-256,ssh-rsa&lt;/P&gt;&lt;P class=""&gt;Encryption Algorithms:chacha20-poly1305@openssh.com,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-gcm,aes256-gcm,aes128-ctr,aes192-ctr,aes256-ctr&lt;/P&gt;&lt;P class=""&gt;MAC Algorithms:hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com&lt;/P&gt;&lt;P class=""&gt;KEX Algorithms:curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512&lt;/P&gt;&lt;P class=""&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;/P&gt;&lt;P class=""&gt;Minimum expected Diffie Hellman key size : 2048 bits&lt;/P&gt;&lt;P class=""&gt;IOS Keys in SECSH format(ssh-rsa, base64 encoded): Cap1-Key&lt;/P&gt;&lt;P class=""&gt;Modulus Size : 2048 bits&lt;/P&gt;&lt;P class=""&gt;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFv/InVkrO/4Kv02hFcJQwFoUmyezP7y3CU/4vne5d&lt;/P&gt;&lt;P class=""&gt;ieVK9t23zs2UlyCsyVa/J37u6QiUEqo1DbJ2mXW86JJd251HxYCQj89sbF4QzF5EmV1FZujVKAa8bh2X&lt;/P&gt;&lt;P class=""&gt;QpPPW+55cREDhRG6DTxqPQq0BZNu7QFu0TvOvKJ/F5yhJ3VZY+kIDQEHbNxnpj0qfWAfEmEgBWrwQgTM&lt;/P&gt;&lt;P class=""&gt;b6OgW4nLqT+aQe50rqWS7XtkVSs4rkTFBFzhDbgToDT/DgVsJHOnEPS57Ee7me3TI8Qgxc5TE6IBu7zc&lt;/P&gt;&lt;P class=""&gt;vxVj2DOmd/3mp79mtCzcMqqyT22r9VrzFGsVJputC95cSml3vgpf3d+2JQzF&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Qualys results:&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;RESULTS: SSH Prefix Truncation Vulnerability (Terrapin) detected on port: 22 ChaCha20-Poly1305 Algorithm Support: False CBC-EtM Algorithm Support: True Strict Key Exchange algorithm enabled: False&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;So, Upgraded to 17.12.05 and seeing the same OpenSSH version 7.4, and&amp;nbsp;&lt;A href="mailto:chacha20-poly1305@openssh.com" target="_blank" rel="noopener"&gt;chacha20-poly1305&amp;nbsp;&lt;/A&gt;enabled as well.&lt;/P&gt;&lt;P class=""&gt;Opened Cisco TAC case on side to see if TAC can give any other direction.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 17:27:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5283917#M1120684</guid>
      <dc:creator>venkatakrishnareddy-maram</dc:creator>
      <dc:date>2025-04-22T17:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5286255#M1120801</link>
      <description>&lt;P&gt;Tested even with 17.15.03 (latest released on 03/18/2025) and see the same OpenSSH version as 7.4.&amp;nbsp;&lt;SPAN&gt;As per the OpenSSH security page (&lt;/SPAN&gt;&lt;A href="https://www.openssh.com/security.html" target="_blank" rel="noopener"&gt;https://www.openssh.com/security.html&lt;/A&gt;&lt;SPAN&gt;), It is fixed only in 9.6 or later versions.&lt;BR /&gt;&lt;/SPAN&gt;Opened a TAC case and they are able to re-pro this in Cisco labs. Waiting for BU resolution for now.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2025 14:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5286255#M1120801</guid>
      <dc:creator>venkatakrishnareddy-maram</dc:creator>
      <dc:date>2025-04-29T14:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5313830#M1121979</link>
      <description>&lt;P&gt;Have you received any response from TAC on the OpenSSH vulnerability and which version has the fixed to&amp;nbsp;Encryption Algorithms:chacha20-poly1305@openssh.com.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 00:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5313830#M1121979</guid>
      <dc:creator>Ibrahim Shaik</dc:creator>
      <dc:date>2025-07-25T00:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5317457#M1122095</link>
      <description>&lt;P&gt;Is there any solution has been received.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 07:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5317457#M1122095</guid>
      <dc:creator>HMEL_Infotech1</dc:creator>
      <dc:date>2025-08-05T07:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5320423#M1122252</link>
      <description>&lt;P&gt;here is a work around i have used on 9300/9500 switches to fix this vulnerability&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To remove the chacha20-poly1305 encryption algorithm use these commands.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;no ip ssh server algorithm encryption &lt;A href="mailto:chacha20-poly1305@openssh.com" target="_blank"&gt;chacha20-poly1305@openssh.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;no ip ssh client algorithm encryption &lt;A href="mailto:chacha20-poly1305@openssh.com" target="_blank"&gt;chacha20-poly1305@openssh.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;next we have to update the mac algorithms in use.&amp;nbsp; We can’t just delete the current ones, so use these 2 commands to update them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip ssh server algorithm mac hmac-sha2-256 hmac-sha2-512&lt;/P&gt;&lt;P&gt;ip ssh client&amp;nbsp; algorithm mac hmac-sha2-256 hmac-sha2-512&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;do show ip ssh again to verify the updates and then save config.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 18:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness-cve-2023-48795/m-p/5320423#M1122252</guid>
      <dc:creator>jimtuttle</dc:creator>
      <dc:date>2025-08-13T18:30:28Z</dc:date>
    </item>
  </channel>
</rss>

