CVE-2024-48460

4.3 MEDIUM

📋 TL;DR

A vulnerability in Eugeny Tabby terminal emulator version 1.0.213 allows remote attackers to capture SSH credentials when connecting to malicious servers. The software sends username and password even when host key verification fails, exposing authentication credentials. Users of Tabby 1.0.213 who connect to SSH servers are affected.

💻 Affected Systems

Products:
  • Eugeny Tabby
Versions: 1.0.213
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects SSH connections through Tabby. Other connection methods and protocols are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

SSH credentials are captured by a malicious server operator, leading to unauthorized access to SSH-protected systems and potential lateral movement.

🟠

Likely Case

Credentials exposed to man-in-the-middle attackers or malicious servers, resulting in compromised SSH accounts.

🟢

If Mitigated

No credential exposure if proper host key verification is enforced or connections are limited to trusted servers.

🌐 Internet-Facing: MEDIUM - Exploitation requires user to connect to malicious server, but many users connect to internet-facing SSH servers.
🏢 Internal Only: LOW - Internal servers are typically trusted, but risk exists if internal servers are compromised.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires user to connect to malicious SSH server.

Exploitation requires user interaction (connecting to server) and a malicious SSH server that fails host key verification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.214 or later

Vendor Advisory: https://github.com/Eugeny/tabby/issues/9955

Restart Required: Yes

Instructions:

1. Open Tabby. 2. Go to Settings > Updates. 3. Check for updates and install version 1.0.214 or newer. 4. Restart Tabby.

🔧 Temporary Workarounds

Disable SSH connections in Tabby

all

Prevent SSH connections through Tabby until patched.

Use alternative SSH client

all

Use native SSH clients (OpenSSH, PuTTY) instead of Tabby for SSH connections.

🧯 If You Can't Patch

  • Only connect to trusted SSH servers with verified host keys
  • Monitor SSH connections for unexpected authentication failures

🔍 How to Verify

Check if Vulnerable:

Check Tabby version in Settings > About. If version is exactly 1.0.213, you are vulnerable.

Check Version:

On Tabby: Open Settings > About tab

Verify Fix Applied:

Verify Tabby version is 1.0.214 or newer in Settings > About.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH host key verification followed by successful authentication
  • SSH connections to unknown/untrusted servers

Network Indicators:

  • SSH connections from Tabby to servers with mismatched host keys

SIEM Query:

source="tabby" AND event="ssh_connection" AND (host_key_verification="failed" OR host_key_mismatch="true")

🔗 References

📤 Share & Export