An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."
{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.14.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:asyncssh_project:asyncssh:*:*:*:*:*:*:*:*"
}