7.2
CVSS 3.1
Share
CVSS VectorNVD
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
Low
Lifecycle Timeline
6
Analysis Updated
Apr 16, 2026 - 06:26 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
patch_available
Apr 16, 2026 - 05:29 EUVD
7.0.0,6.6.6,6.4.21
EUVD ID Assigned
Mar 13, 2026 - 19:12 euvd
EUVD-2025-32575
Analysis Generated
Mar 13, 2026 - 19:12 vuln.today
CVE Published
Oct 02, 2025 - 19:15 nvd
HIGH 7.2
DescriptionNVD
SSH Tectia Server before 6.6.6 sometimes allows attackers to read and alter a user's session traffic.
AnalysisAI
A security vulnerability in SSH Tectia Server before 6.6.6 sometimes (CVSS 7.2) that allows attackers. High severity vulnerability requiring prompt remediation.
Technical ContextAI
Vulnerability type not specified by vendor. CVSS 7.2 indicates high severity. Affects SSH Tectia Server before 6.6.6 sometimes.
RemediationAI
Monitor vendor channels for patch availability.
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-32575