Vulnerability: Secure Shell Daemons

There are multiple vulnerabilities in several implementations of the Secure Shell (SSH) protocol according to CERT. The SSH protocol enables a secure communications channel from a client to a server. "We are seeing a high amount of scanning for SSH daemons, and we are receiving reports of exploitation. System administrators should review their configurations to ensure that they have applied all relevant patches prior to the holiday break."

To solve this problem update your implementation of SSH to the latest release.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about CERT Australia

Show Comments