Headline
CVE-2022-38336: CVSS N/A CVE-2022-38336 — SSH-MITM
An access control issue in MobaXterm before v22.1 allows attackers to make connections to the server via the SSH or SFTP protocols without authentication.
An access control issue in MobaXterm before v22.2 allows attackers to make connections to the server via SSH or SFTP protocols without authentication
Description
When using the default configuration, MonaXterm < v22.2, does not roperly check for the remote server host key when starting SFTP or SSH sessions.
This can result in man in the middle attacks, because the fingerprint on the first connection attempt is automatically accepted.
Note
Further fingerprint changes result in a warning and the user is informed about a potential man in the middle attack.
Du due an information leak from the PuTTY based ssh client, it’s possible for the server to check if the client already knwos the fingerprint or not. This allows an man in the middle attacker to intercept only new connection and avoid clients wich would show an error about chnaged fingerprints.
The default configuration also forwards the ssh agent, wich allows the man in the middle attacker to abuse the forwarded agent to login to other remote servers.
This vulnerability was discovered by AUT-milCERT during an audit of MobaXterm.
Mitigation
Update MobaXterm to version >= v22.2
Release Notes v22.2
- Bugfix: properly check for the remote server host key when starting SFTP sessions
References
- https://mobaxterm.mobatek.net/download-home-edition.html