8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.3%
It was discovered that OpenSSH incorrectly handled signal management. A
remote attacker could use this issue to bypass authentication and remotely
access systems without proper credentials.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 24.04 | noarch | openssh-client | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | openssh-client-dbgsym | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | openssh-server | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | openssh-server-dbgsym | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | openssh-sftp-server | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | openssh-sftp-server-dbgsym | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | openssh-tests | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | openssh-tests-dbgsym | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | ssh | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
Ubuntu | 24.04 | noarch | ssh-askpass-gnome | < 1:9.6p1-3ubuntu13.3 | UNKNOWN |
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.3%