CVE-2019-5672
📋 TL;DR
This vulnerability affects NVIDIA Jetson TX1 and TX2 devices running Linux for Tegra (L4T) where default SSH host keys are not replaced with unique keys after system deployment. This allows attackers to perform man-in-the-middle attacks and potentially decrypt SSH traffic. All users of Jetson TX1/TX2 with L4T versions prior to R28.3 are affected.
💻 Affected Systems
- NVIDIA Jetson TX1
- NVIDIA Jetson TX2
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers can perform persistent man-in-the-middle attacks, decrypt SSH sessions, intercept sensitive data, and potentially gain unauthorized access to affected devices.
Likely Case
Attackers on the same network can intercept SSH traffic to/from vulnerable devices, potentially capturing credentials and sensitive data.
If Mitigated
With proper network segmentation and monitoring, impact is limited to internal network compromise of affected devices.
🎯 Exploit Status
Exploitation requires network access to intercept SSH traffic. Attackers need to be positioned to perform man-in-the-middle attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: R28.3 and later
Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/4787
Restart Required: Yes
Instructions:
1. Update L4T to version R28.3 or later. 2. Regenerate SSH host keys using 'ssh-keygen -A'. 3. Restart SSH service. 4. Update known_hosts files on all client systems.
🔧 Temporary Workarounds
Manual SSH Key Regeneration
linuxRegenerate SSH host keys manually without upgrading L4T
sudo rm /etc/ssh/ssh_host_*
sudo ssh-keygen -A
sudo systemctl restart ssh
🧯 If You Can't Patch
- Isolate affected devices in separate network segments with strict access controls
- Disable SSH access entirely and use alternative management methods
🔍 How to Verify
Check if Vulnerable:
Check if SSH host keys match known default keys by comparing fingerprints with other devices or checking key creation dates
Check Version:
cat /etc/nv_tegra_release
Verify Fix Applied:
Verify SSH host keys are unique by checking fingerprints and ensuring they were generated after system deployment
📡 Detection & Monitoring
Log Indicators:
- Multiple SSH connection failures from different IPs
- SSH host key mismatch warnings in client logs
- Unusual SSH traffic patterns
Network Indicators:
- SSH traffic to/from Jetson devices with unusual patterns
- Multiple SSH sessions with same host key fingerprint
SIEM Query:
source="ssh.log" AND ("Host key verification failed" OR "WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED") AND host="jetson*"