VYPR
High severityNVD Advisory· Published May 13, 2026· Updated May 13, 2026

CVE-2026-44467

CVE-2026-44467

Description

The Claude Desktop app gives you Claude Code with a graphical interface built for running multiple sessions side by side. From 1.2581.0 to before 1.4304.0, Claude Desktop's SSH remote development feature verified only whether a hostname existed in ~/.ssh/known_hosts without comparing the server's presented host key against the stored key. This allowed a network-positioned attacker to present an arbitrary SSH host key and have the connection silently accepted, enabling a man-in-the-middle attack on remote development sessions. Successful exploitation required the attacker to be in a network position to intercept SSH traffic (e.g., via ARP spoofing, rogue Wi-Fi, or DNS poisoning) and the target hostname to already have an entry in the victim's known_hosts file. This vulnerability is fixed in 1.4304.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Claude Desktop's SSH remote dev feature bypassed host key verification, enabling MITM attacks; fixed in 1.4304.0.

Vulnerability

Claude Desktop versions 1.2581.0 through before 1.4304.0, when using the SSH remote development feature, only verified that a hostname existed in ~/.ssh/known_hosts without comparing the server's presented host key against the stored key [1]. This allowed a network-positioned attacker to present an arbitrary SSH host key and have the connection silently accepted.

Exploitation

An attacker must be in a network position to intercept SSH traffic (e.g., via ARP spoofing, rogue Wi-Fi, or DNS poisoning) and the target hostname must already have an entry in the victim's known_hosts file [1]. The attacker can then present any SSH host key during connection establishment.

Impact

Successful exploitation enables a man-in-the-middle attack on remote development sessions, potentially leading to disclosure of sensitive information, code injection, or further compromise of the development environment [1].

Mitigation

The vulnerability is fixed in Claude Desktop version 1.4304.0 [1]. Users on auto-update have already received the fix; manual updaters should update to the latest version [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.