Vulnerabilities

The following section provides an overview of recent vulnerabilities in SSH clients, servers, and related programs. This information is crucial for understanding potential threats and ensuring the security of your SSH-based systems during malware analysis, security audits, and other projects.

Understanding the common vulnerabilities and their impact is essential for organizations looking to secure their infrastructure and minimize the risk of a successful attack.

Note

Only vulnerabilities, which are included in SSH-MITM, are listed.

The vulnerabilities are divided into 4 categories to show the risk.

Severity

Base Score Range

Description

none

0.0

No risk or not a vulnerability

low

0.1-3.9

Low risk

medium

4.0-6.9

Medium risk

high

7.0-10.0

High risk