Vulnerabilities
The following section provides an overview of recent vulnerabilities in SSH clients, servers, and related programs. This information is crucial for understanding potential threats and ensuring the security of your SSH-based systems during malware analysis, security audits, and other projects.
Understanding the common vulnerabilities and their impact is essential for organizations looking to secure their infrastructure and minimize the risk of a successful attack.
Note
Only vulnerabilities, which are included in SSH-MITM, are listed.
The vulnerabilities are divided into 4 categories to show the risk.
Severity |
Base Score Range |
Description |
---|---|---|
none |
0.0 |
No risk or not a vulnerability |
low |
0.1-3.9 |
Low risk |
medium |
4.0-6.9 |
Medium risk |
high |
7.0-10.0 |
High risk |