Vulnerability: Secure Shell Daemons

There are multiple vulnerabilities in several implementations of the Secure Shell (SSH) protocol according to CERT. The SSH protocol enables a secure communications channel from a client to a server. "We are seeing a high amount of scanning for SSH daemons, and we are receiving reports of exploitation. System administrators should review their configurations to ensure that they have applied all relevant patches prior to the holiday break."

To solve this problem update your implementation of SSH to the latest release.

Join the newsletter!

Error: Please check your email address.

More about CERT Australia

Show Comments