The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
{
"license": "CC-BY-4.0",
"sources": [
{
"id": "CVE-2020-14145",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2020-14145",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14145",
"published": "2020-06-29T18:15:11.940Z",
"modified": "2025-12-18T15:15:48.410Z",
"imported": "2026-04-09T14:56:18.788Z"
}
]
}