CVE-2026-44467
Description
The Claude Desktop app gives you Claude Code with a graphical interface built for running multiple sessions side by side. From 1.2581.0 to before 1.4304.0, Claude Desktop's SSH remote development feature verified only whether a hostname existed in ~/.ssh/known_hosts without comparing the server's presented host key against the stored key. This allowed a network-positioned attacker to present an arbitrary SSH host key and have the connection silently accepted, enabling a man-in-the-middle attack on remote development sessions. Successful exploitation required the attacker to be in a network position to intercept SSH traffic (e.g., via ARP spoofing, rogue Wi-Fi, or DNS poisoning) and the target hostname to already have an entry in the victim's known_hosts file. This vulnerability is fixed in 1.4304.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Claude Desktop's SSH remote dev feature bypassed host key verification, enabling MITM attacks; fixed in 1.4304.0.
Vulnerability
Claude Desktop versions 1.2581.0 through before 1.4304.0, when using the SSH remote development feature, only verified that a hostname existed in ~/.ssh/known_hosts without comparing the server's presented host key against the stored key [1]. This allowed a network-positioned attacker to present an arbitrary SSH host key and have the connection silently accepted.
Exploitation
An attacker must be in a network position to intercept SSH traffic (e.g., via ARP spoofing, rogue Wi-Fi, or DNS poisoning) and the target hostname must already have an entry in the victim's known_hosts file [1]. The attacker can then present any SSH host key during connection establishment.
Impact
Successful exploitation enables a man-in-the-middle attack on remote development sessions, potentially leading to disclosure of sensitive information, code injection, or further compromise of the development environment [1].
Mitigation
The vulnerability is fixed in Claude Desktop version 1.4304.0 [1]. Users on auto-update have already received the fix; manual updaters should update to the latest version [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.