6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
7.8 High
AI Score
Confidence
Low
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
0.935 High
EPSS
Percentile
99.1%
A vulnerability in the SSH protocol implementation is related to the ability to adjust packet sequence numbers during the connection negotiation process and remove an arbitrary number of SSH service messages.
during the connection negotiation process and cause an arbitrary number of SSH service messages to be deleted.
Exploitation of the vulnerability could allow a remote attacker to bypass integrity checks,
disable existing security features, and gain unauthorized access to protected information
Vulnerability of OpenSSH cryptographic protection tool ssh-agent is related to key management errors.
keys. Exploitation of the vulnerability may allow an intruder to disclose protected information
Vulnerability of SSH protocol implementation of OpenSSH cryptographic protection tool is related to introduction or modification of argument.
argument modification. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary commands
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
7.8 High
AI Score
Confidence
Low
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
0.935 High
EPSS
Percentile
99.1%