All the vulnerabilites related to ssh - tectia_connectsecure
cve-2008-5161
Vulnerability from cvelistv5
Published
2008-11-19 17:00
Modified
2024-08-07 10:40
Severity ?
EPSS score ?
Summary
Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:40:17.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openssh.org/txt/cbc.adv" }, { "name": "247186", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1" }, { "name": "32319", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32319" }, { "name": "33121", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "49872", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/49872" }, { "name": "33308", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33308" }, { "name": "RHSA-2009:1287", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt" }, { "name": "1021382", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021382" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "name": "50036", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/50036" }, { "name": "32833", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32833" }, { "name": "36558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36558" }, { "name": "50035", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/50035" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ssh.com/company/news/article/953/" }, { "name": "1021235", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021235" }, { "name": "34857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34857" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.attachmate.com/techdocs/2398.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html" }, { "name": "ADV-2008-3173", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3173" }, { "name": "20081123 Revised: OpenSSH security advisory: cbc.adv", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded" }, { "name": "openssh-sshtectia-cbc-info-disclosure(46620)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620" }, { "name": "32740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32740" }, { "name": "ADV-2009-1135", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1135" }, { "name": "32760", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32760" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "1021236", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021236" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106" }, { "name": "HPSBMA02447", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isc.sans.org/diary.html?storyid=5366" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "SSRT090062", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "ADV-2008-3409", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3409" }, { "name": "ADV-2008-3172", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3172" }, { "name": "oval:org.mitre.oval:def:11279", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279" }, { "name": "20081121 OpenSSH security advisory: cbc.adv", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "VU#958563", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/958563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openssh.org/txt/cbc.adv" }, { "name": "247186", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1" }, { "name": "32319", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32319" }, { "name": "33121", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "49872", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/49872" }, { "name": "33308", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33308" }, { "name": "RHSA-2009:1287", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt" }, { "name": "1021382", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021382" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "name": "50036", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/50036" }, { "name": "32833", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32833" }, { "name": "36558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36558" }, { "name": "50035", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/50035" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ssh.com/company/news/article/953/" }, { "name": "1021235", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021235" }, { "name": "34857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34857" }, { "tags": [ "x_refsource_MISC" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.attachmate.com/techdocs/2398.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html" }, { "name": "ADV-2008-3173", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3173" }, { "name": "20081123 Revised: OpenSSH security advisory: cbc.adv", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded" }, { "name": "openssh-sshtectia-cbc-info-disclosure(46620)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620" }, { "name": "32740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32740" }, { "name": "ADV-2009-1135", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1135" }, { "name": "32760", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32760" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "1021236", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021236" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106" }, { "name": "HPSBMA02447", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isc.sans.org/diary.html?storyid=5366" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "SSRT090062", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "ADV-2008-3409", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3409" }, { "name": "ADV-2008-3172", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3172" }, { "name": "oval:org.mitre.oval:def:11279", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279" }, { "name": "20081121 OpenSSH security advisory: cbc.adv", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "VU#958563", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/958563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5161", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openssh.org/txt/cbc.adv", "refsource": "CONFIRM", "url": "http://openssh.org/txt/cbc.adv" }, { "name": "247186", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1" }, { "name": "32319", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32319" }, { "name": "33121", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33121" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "49872", "refsource": "OSVDB", "url": "http://osvdb.org/49872" }, { "name": "33308", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33308" }, { "name": "RHSA-2009:1287", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html" }, { "name": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt", "refsource": "MISC", "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt" }, { "name": "1021382", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021382" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "name": "50036", "refsource": "OSVDB", "url": "http://osvdb.org/50036" }, { "name": "32833", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32833" }, { "name": "36558", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36558" }, { "name": "50035", "refsource": "OSVDB", "url": "http://osvdb.org/50035" }, { "name": "http://www.ssh.com/company/news/article/953/", "refsource": "CONFIRM", "url": "http://www.ssh.com/company/news/article/953/" }, { "name": "1021235", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021235" }, { "name": "34857", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34857" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm" }, { "name": "http://support.attachmate.com/techdocs/2398.html", "refsource": "CONFIRM", "url": "http://support.attachmate.com/techdocs/2398.html" }, { "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html", "refsource": "CONFIRM", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html" }, { "name": "ADV-2008-3173", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3173" }, { "name": "20081123 Revised: OpenSSH security advisory: cbc.adv", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded" }, { "name": "openssh-sshtectia-cbc-info-disclosure(46620)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620" }, { "name": "32740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32740" }, { "name": "ADV-2009-1135", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1135" }, { "name": "32760", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32760" }, { "name": "ADV-2009-3184", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "1021236", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021236" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106" }, { "name": "HPSBMA02447", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "http://isc.sans.org/diary.html?storyid=5366", "refsource": "MISC", "url": "http://isc.sans.org/diary.html?storyid=5366" }, { "name": "APPLE-SA-2009-11-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "SSRT090062", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "ADV-2008-3409", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3409" }, { "name": "ADV-2008-3172", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3172" }, { "name": "oval:org.mitre.oval:def:11279", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279" }, { "name": "20081121 OpenSSH security advisory: cbc.adv", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded" }, { "name": "http://support.apple.com/kb/HT3937", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3937" }, { "name": "VU#958563", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/958563" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5161", "datePublished": "2008-11-19T17:00:00", "dateReserved": "2008-11-19T00:00:00", "dateUpdated": "2024-08-07T10:40:17.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27891
Vulnerability from cvelistv5
Published
2021-03-15 14:07
Modified
2024-08-03 21:33
Severity ?
EPSS score ?
Summary
SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected.
References
▼ | URL | Tags |
---|---|---|
https://info.ssh.com/tectia-vulnerability-cve-2021-27891 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:33:15.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-15T14:16:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-27891", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891", "refsource": "MISC", "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-27891", "datePublished": "2021-03-15T14:07:27", "dateReserved": "2021-03-02T00:00:00", "dateUpdated": "2024-08-03T21:33:15.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27893
Vulnerability from cvelistv5
Published
2021-03-15 14:05
Modified
2024-08-03 21:33
Severity ?
EPSS score ?
Summary
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected.
References
▼ | URL | Tags |
---|---|---|
https://info.ssh.com/tectia-vulnerability-cve-2021-27893 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:33:16.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-15T14:18:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-27893", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893", "refsource": "MISC", "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-27893", "datePublished": "2021-03-15T14:05:44", "dateReserved": "2021-03-02T00:00:00", "dateUpdated": "2024-08-03T21:33:16.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27892
Vulnerability from cvelistv5
Published
2021-03-15 14:08
Modified
2024-08-03 21:33
Severity ?
EPSS score ?
Summary
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected.
References
▼ | URL | Tags |
---|---|---|
https://info.ssh.com/tectia-vulnerability-cve-2021-27892 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:33:16.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-15T14:14:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-27892", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892", "refsource": "MISC", "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-27892", "datePublished": "2021-03-15T14:08:53", "dateReserved": "2021-03-02T00:00:00", "dateUpdated": "2024-08-03T21:33:16.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-11-19 17:30
Modified
2024-11-21 00:53
Severity ?
Summary
Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*", "matchCriteriaId": "3B042083-6D26-4A91-B3F6-E6D46266FF60", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6693DC2D-CDA1-4E37-9569-58874F55A48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "16CDE975-9E08-493B-9385-3EC2CABC4A15", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A63EA6B-2400-48C4-924D-3509971CCBEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0658F08E-2596-4D8E-91AA-44A9DBE8F151", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "74169893-A34F-49FB-8C83-36C4AA808925", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "013E94CC-AF68-44D0-826F-28B1825A8DA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9981E30-0D54-4464-8287-E450E7E8F770", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4ED17577-F56D-48DF-8863-B4FF039C47D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B74A91E2-C93E-49F4-B349-8E4CEC285C03", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*", "matchCriteriaId": "FBF7244A-BFF7-4C7C-82FF-6B53236DB86D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BADA4CC-FC94-427A-AF93-9AAFDAADDB91", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*", "matchCriteriaId": "1356E837-2CF3-4AF9-80DD-FA2A97B3B2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F1D6B7F-8B52-42C0-8613-740CACFB3463", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5024EC6-2A47-4ACE-A661-B78D314C7D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA64A6E8-0EB7-4BCA-A7AA-245A466C2F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5058DC44-835D-4BD9-B550-E5CB22F6475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "23ED4911-6CF5-4562-B421-A328D7BE0291", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*", "matchCriteriaId": "E7F3388A-39FA-4A3A-819A-764A16AAEB54", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*", "matchCriteriaId": "C90B0480-C558-41BD-A16C-AD63DA1C09C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "81DDF3D8-35EA-4677-B1AC-1CA674EEBCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37366E9-F1B6-4458-AE1C-790405AC8740", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C727829-5E3A-41F6-BAB3-01AED39674D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "1CF57477-FB53-49CC-BAD4-CDC0FD9363F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "65FB72FC-37EE-4D42-893E-9C0924EEA2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "D863ED8D-2B63-4497-B250-6AFA29D6D9D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "D2BF5D4C-DFF8-4094-82A6-A1302169CD43", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "F5C5413C-47F1-4E3B-B618-2AECECA780FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "490A294D-AB7C-45C2-B887-1C3D2992AD91", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "43712853-9002-4778-9036-754262880B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "41A83090-D05D-40DD-AA29-F032CC165A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C5BCE145-44F4-4FED-8936-3AEBF8B38357", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*", "matchCriteriaId": "888C2DE3-2874-4310-9584-3AC96A82C306", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB6587AA-E91D-4194-81D0-FCF1AA382CAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*", "matchCriteriaId": "237D84A0-3FC3-4CFD-9454-ACD9E42DCC4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6B2C7F5-8182-48B8-AA8A-C0F45978D3D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*", "matchCriteriaId": "F5EAC7A0-CD7D-4AE9-8421-9CDFFD073B5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "17855D5D-BDF5-48D3-9D71-694A3D41A826", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*", "matchCriteriaId": "3915E4A8-6CCF-44A3-85B9-70651137C084", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A5DEDB4-7E16-4356-B080-09BCDA68772F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC9DBDC7-DDF0-4596-84BC-E4E05F47F938", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "36FA61F9-CE29-47B0-AF2A-B1045A59018E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "9B338837-6346-48FC-A4D7-011EC20ACF61", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8644D458-786D-4310-BAA8-40B2E27EA966", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4746C2E-91B1-4341-9CCD-78191BDF9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F3FCC3E-F3D5-4F90-B64F-85576E8B776B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "17672CBB-A79F-4B91-9B01-193F960A4611", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "177E5CE0-A518-447F-9397-FC527E367077", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C808743-BFAF-4BB4-B0F0-13DF2C7D5531", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB90715C-E50C-4682-8C94-DE5CBCAA9965", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6A8F8009-3586-4989-B180-2F46503DA59B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "44DDAAA8-185D-47FE-8434-E2FC000BD926", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F2E5D670-FB1F-4560-A5A0-149FB4FCD2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "49A0662D-9356-4DC9-8082-58DBEE5C65FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "4E858413-3408-4A77-B56D-5016959FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "CFFB475D-7996-48B3-8886-9000C6230414", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E56BFE1-044A-45AC-BF9C-C0CFBD2F8C7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E72BBCB-636C-4939-90B7-308223E433EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A5884968-F218-4CD4-AD4B-4C0CD26EF674", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "56FD197E-27E9-4AF4-8A84-E1D0A7FD14DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DCD63A2-B666-4F5E-9D17-ED38B0BF973C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "63E32B6A-AF41-4AEA-B55B-52B821106D00", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0BC18FBF-1C2E-4D2F-9D3C-C6578CCBDB50", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0824B78E-EB43-4D74-9062-79D0F273B06E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "0A76B02F-C2C8-4A35-A60A-EC74F43B8895", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8CD470B-274F-421C-AD4D-6D076935D741", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C30FE48E-857E-441C-B497-B6E541D2913F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A813EED-25AC-4191-92E8-58C1BC7D1E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "8719CEF9-6753-495B-9ACB-9E323CB7BCDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "553D3277-1B91-4998-A610-7E5D3E2C1413", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "17886B3D-394C-4C94-93B2-FAB23B45C880", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "7584F9C5-41E9-4F84-9849-B5D604BB55A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "00008DAA-F66D-484B-941B-944F3E684981", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "EEF4DE0B-ED77-49CE-AE0C-2AF2AE35FB78", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "38EF9A76-6D83-4C99-A1DE-DC7E5AF28731", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "3C13F8DE-007E-467E-9872-9C4A951F1EE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "698824F0-DDFA-4469-8D42-59A56ACD6B5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "30A3B9E9-3643-443B-A19A-2AE989832C50", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F86A43A5-0906-405E-B3D0-250DA24A9093", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "3126AFB2-A043-4C51-8402-D36D2F62AA73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B00D37C5-5C79-46F9-97B7-555E48C53796", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "55A817B6-CD13-4E0A-99DD-C5C39DF04C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C6F7054-6EDF-4F25-945E-E24F00A4A2B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "16BEBCBF-8826-4451-9B6B-802BD8A4FA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "59F1EE63-6CF7-440D-BC5B-23D721996275", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C446EEE-3D06-485D-A031-2DA2A6501712", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F90B0C0-1CA9-47F8-B603-D6C15CF33352", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "D7292ADB-5D2C-4569-93B5-76125D71E3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "2810AD0C-4C6F-4B07-8D72-2D640219AE82", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "06C3FAFB-90D2-4C6D-A210-27297926433E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "78E26C82-CA31-4EBB-9635-D895B04D90E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "170C4ADE-68C7-4F73-BD64-800D8E07F5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7FB022A4-BFF0-4154-A8B6-C38B6C09A1BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "026CCB02-C710-4AEA-B002-852AD4A3DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "02ACCEFF-1301-4118-BFCA-877F7A1D84B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "625EE79F-33C9-4272-A37C-F82921950EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "3E4480D2-1B5C-443D-8D7F-976885C33BDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "795DEA94-79D6-4132-B205-AB098E92216A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD05A3E8-105D-4712-8BBE-2D5CF4F78890", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8D6691FF-77F2-4AE3-B49F-BFB8744AD046", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E58648AC-7288-46EC-B2BB-0805626BA31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F8A31AD-D2E8-45DC-BF80-BD102B1FBC83", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "62FBDA08-566F-4D21-8186-4A287FD2F107", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B1DB64D-028A-422F-B106-873A45789A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "12509D69-71AF-48AF-986F-04A7E248011A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "075B6E8D-4C4B-4E98-94C6-52B842BE65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BEDF9DB2-6C3D-4BF5-BF55-818C3932CF93", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "27B99F6E-712C-4205-9185-26F543EFC881", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F31FAA8F-EE03-4A7F-B0DE-BB4CE998FEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AF0262B-1451-40CA-9DD1-F2DEA793BD61", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C27E0224-9431-49EF-8B32-850CDF6FFFE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "88A88A21-7427-4452-8C2A-6C31542FA83C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "A3DCEAA0-509A-4978-BE53-0CBE084366FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "3203DC73-05F2-4A28-9E62-3D87B482586A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "9BDA1AAC-3FCF-47D8-A6B4-9DB0D776CE14", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "64F4CDF1-695A-4677-A829-74BB365BF4FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "BBEF55DD-FC87-42A3-9DAF-9862AA9649CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "61188360-C55E-47AD-8C3E-043689249DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A5BCE08-8940-4658-A4D7-5CAD33D3751C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC0FA974-7671-4FB7-BB36-274B5970EBAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "011F841A-4F1B-49B2-B379-9FE126141568", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B3C54819-CF51-4BBE-873F-4A0E2072D10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "743C5472-860C-48A6-AED7-BB00B6E91440", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "2094ACB3-635A-437D-AF0E-4BFEB496EDF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "40BE9A01-DEE5-4CD4-8C01-6689707A47EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "2838C7E9-F247-491B-AAD1-680927044C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "EAB99E2A-AF4D-4436-9C4F-EB043F8D16A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "86E5680C-2E57-4BFA-9D60-B560BA819039", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "83D8769C-E438-4805-955A-4EA7A274F036", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3B2E96C8-F8F8-4002-B242-3ADDF1E84B7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2ADC814-3F33-47F6-AE27-7233F5D337AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B56052F-6768-41D6-9E91-F1377EB4E122", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9803DD4B-C48D-45EA-8154-C1C626DBDED2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "702A52AE-4E48-4138-8856-9EBE5A8DA964", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "B8C108AB-0C7C-4B58-8B54-C92C95A6B65D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "509B3B08-533C-46CE-B53F-5A2BFC553C53", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F0F992DB-F70C-4473-8C33-B5F59BD83A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "84D8E570-70B9-42CF-9764-238AAF6B380F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "9E582465-CC4A-4827-8C1F-548F01D6FCF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "60515678-F93E-46CC-94EF-0EF9B2091D76", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4054251B-98C7-4AC9-B610-BA0EB250972C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "5B4AC671-C67D-46EC-9FB2-720F0DC3D4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6A93E9C5-91A4-4FC1-871B-ECE0E0FAFAA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "958F4FB0-C7DA-48D8-9500-A4A43ED807E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D772EE8-FB18-4431-89D8-FAF42797A2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "A3A30FB0-35AB-4CF2-B74D-68015044770B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "75DA0AC9-E2BF-40C7-B970-43D0283FCC6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "EA26CDDC-24FD-4FFD-BA5E-79F55BC8DA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "1003EDA5-E22E-4A4E-A289-660E823EE71F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "844003FE-63E9-4E2F-83E6-02798B753FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ED73DCC-6501-4DA8-B0C0-45F1A6E97BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "711A3119-3390-48A9-8579-1D768D66386D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "798BE0FE-52F1-4283-8A0D-3E769A3752C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "9F77CD27-4E7E-4B4A-9363-FC87B611338A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "09B1AFF1-4F5D-42F0-A3A7-91BB9854B561", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "01872E42-E249-48AB-9259-FF3B0F3CAA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "B73B06FD-3452-4900-AE09-44172A1EF174", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "DC126AA4-30B6-429B-A981-E4F0BCE03DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "1932FFE5-DC06-4560-ADA7-4C993B8A880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "67BA8F3E-57F3-4388-8CD0-431AAA8DDB36", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "2BDEED3F-3936-429C-957E-9E3EE455445C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "71C39323-60AF-4CB5-BA5A-1F45353614F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*", "matchCriteriaId": "3FE3D768-A3CF-422A-9EE2-6256E3ADDBEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6D8E4B95-A551-4839-995F-5667CD215540", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8B474CD5-DEC0-49DB-992D-658A3C573982", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DB98ADBD-7FBB-4495-A71B-8EF9A6EAC33B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*", "matchCriteriaId": "356A4B29-4BE7-4D33-8B64-CECCA6C24FAF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors." }, { "lang": "es", "value": "Error en el manejo del protocolo SSH en (1) SSH Tectia Client y Server y Connector 4v.0 a la v4.4.11, v5.0 a la v5.2.4, y v5.3 a la v5.3.8; Client y Server y ConnectSecure v6.0 a la v6.0.4; Server para Linux sobre IBM System z v6.0.4; Server para IBM z/OS v5.5.1 y anteriores, v6.0.0, y v6.0.1; y Client v4.0-J a la v4.3.3-J y v4.0-K a la v4.3.10-K; y (2) OpenSSH v4.7p1 y posiblemente otras versiones, cuando usan un algoritmo de bloque cifrado en el modo Cipher Block Chaining (CBC), facilita a los atacantes remotos el conseguir cierta informaci\u00f3n en texto plano desde cualquier bloque de texto cifrado de su elecci\u00f3n en una sessi\u00f3n SSH mediante vectores de ataque desconocidos." } ], "evaluatorComment": "http://securitytracker.com/alerts/2008/Nov/1021235.html\n\nCBC mode connections are affected", "evaluatorSolution": "With a valid username and password patches are available at the following link:\nhttps://downloads.ssh.com/", "id": "CVE-2008-5161", "lastModified": "2024-11-21T00:53:25.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-11-19T17:30:00.670", "references": [ { "source": "cve@mitre.org", "url": "http://isc.sans.org/diary.html?storyid=5366" }, { "source": "cve@mitre.org", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://openssh.org/txt/cbc.adv" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/49872" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/50035" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/50036" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32740" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32760" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32833" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/33121" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/33308" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34857" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36558" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3937" }, { "source": "cve@mitre.org", "url": "http://support.attachmate.com/techdocs/2398.html" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm" }, { "source": "cve@mitre.org", "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/958563" }, { "source": "cve@mitre.org", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32319" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021235" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021236" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021382" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.ssh.com/company/news/article/953/" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3172" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3173" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3409" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1135" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620" }, { "source": "cve@mitre.org", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "source": "cve@mitre.org", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106" }, { "source": "cve@mitre.org", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://isc.sans.org/diary.html?storyid=5366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openssh.org/txt/cbc.adv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/49872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/50035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/50036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.attachmate.com/techdocs/2398.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/958563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ssh.com/company/news/article/953/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue was addressed for Red Hat Enterprise Linux 5 by\nhttps://rhn.redhat.com/errata/RHSA-2009-1287.html\n\nAfter reviewing the upstream fix for this issue, Red Hat does not intend to address this flaw in Red Hat Enterprise Linux 3 or 4 at this time.", "lastModified": "2009-09-02T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-15 15:15
Modified
2024-11-21 05:58
Severity ?
Summary
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ssh | tectia_client | * | |
ssh | tectia_connectsecure | - | |
ssh | tectia_server | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:tectia_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "F19AD707-E08D-4D78-AE68-46806EBABE3B", "versionEndExcluding": "6.4.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connectsecure:-:*:*:*:*:*:*:*", "matchCriteriaId": "058495B9-2E81-4400-9A70-8E58A623BA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "18B662B1-6336-41F2-A5CA-55E875E43718", "versionEndExcluding": "6.4.19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected." }, { "lang": "es", "value": "SSH Tectia Client and Server versiones anteriores a 6.4.19 en Windows, permiten una escalada de privilegios locales en condiciones no est\u00e1ndar.\u0026#xa0;ConnectSecure en Windows est\u00e1 afectado" } ], "id": "CVE-2021-27893", "lastModified": "2024-11-21T05:58:43.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-15T15:15:15.837", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-15 15:15
Modified
2024-11-21 05:58
Severity ?
Summary
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ssh | tectia_client | * | |
ssh | tectia_connectsecure | - | |
ssh | tectia_server | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:tectia_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "F19AD707-E08D-4D78-AE68-46806EBABE3B", "versionEndExcluding": "6.4.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connectsecure:-:*:*:*:*:*:*:*", "matchCriteriaId": "058495B9-2E81-4400-9A70-8E58A623BA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "18B662B1-6336-41F2-A5CA-55E875E43718", "versionEndExcluding": "6.4.19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected." }, { "lang": "es", "value": "SSH Tectia Client and Server versiones anteriores a 6.4.19 en Windows, permiten una escalada de privilegios locales.\u0026#xa0;ConnectSecure en Windows est\u00e1 afectado" } ], "id": "CVE-2021-27892", "lastModified": "2024-11-21T05:58:43.293", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-15T15:15:15.760", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-15 15:15
Modified
2024-11-21 05:58
Severity ?
Summary
SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ssh | tectia_client | * | |
ssh | tectia_connectsecure | - | |
ssh | tectia_server | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:tectia_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "F19AD707-E08D-4D78-AE68-46806EBABE3B", "versionEndExcluding": "6.4.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_connectsecure:-:*:*:*:*:*:*:*", "matchCriteriaId": "058495B9-2E81-4400-9A70-8E58A623BA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:tectia_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "18B662B1-6336-41F2-A5CA-55E875E43718", "versionEndExcluding": "6.4.19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected." }, { "lang": "es", "value": "SSH Tectia Client and Server versiones anteriores a 6.4.19 en Windows, presentan una generaci\u00f3n de claves d\u00e9bil.\u0026#xa0;ConnectSecure en Windows est\u00e1 afectado" } ], "id": "CVE-2021-27891", "lastModified": "2024-11-21T05:58:43.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-15T15:15:15.697", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }