Ssh

65 CVEs product

Monthly

CVE-2026-35388 LOW Monitor

OpenSSH before 10.3 fails to confirm connection multiplexing in proxy-mode sessions, allowing local attackers with user interaction to bypass intended access controls and potentially manipulate multiplexed connections. The vulnerability affects OpenSSH versions prior to 10.3p1 and requires local access with user interaction (UI:R) on the affected system; while the CVSS score is low (2.5) and integrity impact is limited, the omission of confirmation mechanisms in proxy-mode multiplexing creates a logic flaw that could enable unauthorized session hijacking or redirection in multi-user environments.

Information Disclosure Ssh
NVD
CVSS 3.1
2.5
EPSS
0.0%
CVE-2026-35387 LOW Monitor

OpenSSH before 10.3 incorrectly interprets ECDSA algorithm specifications in PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms configuration options, allowing authenticated users to authenticate using unintended ECDSA variants. The vulnerability requires authenticated network access and high attack complexity, resulting in a low CVSS score of 3.1 with integrity impact but no confidentiality or availability loss. No public exploit code or active exploitation has been documented.

Ssh Information Disclosure
NVD VulDB
CVSS 3.1
3.1
EPSS
0.0%
CVE-2026-35386 LOW Monitor

OpenSSH before version 10.3 allows local privilege escalation through shell metacharacter injection in usernames when non-default ssh_config token expansion (%) is enabled. A local authenticated attacker with limited privileges can execute arbitrary commands by crafting a malicious username containing shell metacharacters, provided the system administrator has configured ssh_config to expand user-controlled tokens. This requires low user privileges and high attack complexity due to configuration constraints, but impacts confidentiality and integrity on affected systems.

Information Disclosure Ssh
NVD VulDB
CVSS 3.1
3.6
EPSS
0.0%
CVE-2026-35414 MEDIUM This Month

OpenSSH before version 10.3 mishandles the authorized_keys principals option when a principals list is combined with a Certificate Authority that uses certain comma character patterns, allowing authenticated local or remote users to disclose sensitive authorization information or manipulate authentication decisions. This vulnerability affects all OpenSSH versions prior to 10.3p1 and requires authenticated access (PR:L) with non-trivial attack complexity (AC:H), resulting in partial confidentiality and integrity impact. No public exploit code or active exploitation has been identified at time of analysis.

Ssh Information Disclosure
NVD VulDB
CVSS 3.1
4.2
EPSS
0.0%
CVE-2026-35385 HIGH This Week

OpenSSH's legacy scp protocol (pre-10.3) can install downloaded files with elevated setuid/setgid permissions when root users transfer files with -O flag without -p. This enables privilege escalation vectors if attackers control file server content or conduct man-in-the-middle attacks (CVSS AV:N/AC:H/UI:R). No public exploit identified at time of analysis, though exploitation probability is moderate given the specific configuration requirements (root usage, legacy protocol flag, missing preserve-mode flag).

Ssh Information Disclosure
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-0964 MEDIUM PATCH This Month

SCP client implementations across Red Hat Enterprise Linux 6-10 and OpenShift Container Platform 4 are vulnerable to path traversal during file transfer, allowing a malicious SCP server to write files outside the designated working directory and potentially execute arbitrary code or modify system configuration. This vulnerability mirrors CVE-2019-6111 in OpenSSH; unauthenticated remote attackers can exploit it with high user interaction (the victim must initiate an SCP connection to a malicious server), resulting in confidentiality, integrity, and availability compromise. No public exploit code or active exploitation has been confirmed at the time of analysis.

Ssh Path Traversal
NVD
CVSS 3.0
5.0
EPSS
0.0%
CVE-2026-23943 MEDIUM PATCH This Month

A remote code execution vulnerability (CVSS 6.9) that allows denial of service. Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Microsoft Denial Of Service Ssh Suse
NVD VulDB GitHub
CVSS 4.0
6.9
EPSS
0.0%
CVE-2025-67035 CRITICAL Act Now

Critical vulnerability in Lantronix EDS serial device server (EDS5000/EDS3000PS). Multiple injection and auth bypass vulnerabilities in the management interface.

Ssh
NVD VulDB
CVSS 3.1
9.8
EPSS
0.0%
CVE-2025-41761 HIGH This Week

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo. [CVSS 7.8 HIGH]

Ssh Privilege Escalation Universal Bacnet Router Firmware
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-30832 CRITICAL POC PATCH Act Now

SSRF in Soft Serve Git server versions 0.6.0 to 0.11.3 allows authenticated attackers to make requests to internal services. PoC and patch available.

Ssh Soft Serve
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-0847 HIGH PATCH This Week

Unauthorized file access in NLTK through path traversal flaws in multiple CorpusReader classes (versions up to 3.9.2) allows unauthenticated attackers to read arbitrary files on affected systems, potentially exposing SSH keys, API tokens, and other sensitive data. The vulnerability affects NLP applications and machine learning APIs that process user-controlled file inputs without proper validation. No patch is currently available.

Ssh RCE Path Traversal AI / ML Redhat +1
NVD
CVSS 3.0
8.6
EPSS
0.2%
CVE-2026-20009 MEDIUM This Month

Unauthenticated SSH authentication bypass in Cisco Secure Firewall ASA allows remote attackers to log in as arbitrary users by exploiting insufficient input validation during the SSH key authentication phase, requiring only knowledge of a valid username and its associated public key. This vulnerability enables attackers to execute arbitrary commands on affected ASA devices with the privileges of the compromised user account. No patch is currently available.

Cisco Ssh
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-1627 MEDIUM This Month

Outdated MAC algorithms in SSH implementations for Mrs1000 and Lms1000 device firmware enable network-positioned attackers to tamper with session data integrity without user interaction. An attacker with network access can manipulate transmitted SSH traffic due to the use of cryptographically weak message authentication codes. No patch is currently available for affected devices.

Ssh Mrs1000 Firmware Lms1000 Firmware
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-1626 MEDIUM This Month

Weak CBC cipher suite implementations in SSH services across SSH, LMS1000, and MRS1000 devices enable network-positioned attackers to observe or modify encrypted SSH traffic without authentication. The vulnerability requires user interaction and network access but poses a confidentiality risk to sensitive communications. No patch is currently available.

Ssh Lms1000 Firmware Mrs1000 Firmware
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25232 HIGH POC PATCH This Week

Gogs is an open source self-hosted Git service. [CVSS 8.8 HIGH]

Ssh Privilege Escalation Gogs Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-24126 MEDIUM PATCH This Month

Weblate versions up to 5.16.0 contains a vulnerability that allows attackers to an argument injection to `ssh-add` (CVSS 6.6).

Ssh Weblate Suse
NVD GitHub
CVSS 3.1
6.6
EPSS
0.0%
CVE-2026-2618 LOW POC Monitor

A vulnerability was determined in Beetel 777VR1 up to 01.00.09. This impacts an unknown function of the component SSH Service. [CVSS 3.7 LOW]

Ssh
NVD VulDB GitHub
CVSS 3.1
3.7
EPSS
0.0%
CVE-2026-23647 CRITICAL Act Now

Hardcoded OS credentials in Glory RBG-100 cash recycler systems using ISPK-08 software component. Physical cash handling equipment ships with known default credentials enabling complete system takeover.

Linux Ssh
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-2617 MEDIUM POC This Month

The Beetel 777VR1 router's SSH/Telnet service contains insecure default initialization that allows local network attackers to achieve partial compromise of confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and the vendor has not released patches despite early notification. Affected devices running firmware version 01.00.09 and earlier require isolation from untrusted local networks until a security update becomes available.

Ssh Information Disclosure 777vr1 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-32063 MEDIUM This Month

There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vulnerability happens during the startup phase of a specific systemd service, and as a result, the following developer features will be activated: the disabled firewall and the launched SSH server. [CVSS 6.8 MEDIUM]

Ssh
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-14282 MEDIUM This Month

A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote client as root, only switching to the logged-in user upon spawning a shell or performing some operations like reading the user's files. [CVSS 5.4 MEDIUM]

Ssh
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2020-37136 HIGH POC This Week

ZOC Terminal 7.25.5 contains a denial of service vulnerability in the private key file input field that allows attackers to crash the application. [CVSS 7.5 HIGH]

Ssh Denial Of Service
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25539 CRITICAL POC PATCH Act Now

SiYuan knowledge management system prior to 3.5.5 has a path traversal in /api/file/copyFile allowing arbitrary file operations on the server.

Ssh RCE Siyuan
NVD GitHub
CVSS 3.1
9.1
EPSS
0.6%
CVE-2026-25499 HIGH POC PATCH This Week

The Terraform/OpenTofu Proxmox Provider prior to version 0.93.1 contains a path traversal vulnerability in its SSH sudoer configuration documentation that permits attackers to escape directory restrictions using ../ sequences and modify arbitrary files on the system. Public exploit code exists for this vulnerability, affecting users who implement the documented SSH configuration. The vulnerability has been patched in version 0.93.1 and a fix is available.

Ssh Proxmox Terraform Provider Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25157 HIGH PATCH This Week

OpenClaw AI assistant versions prior to 2026.1.29 contain two command injection vulnerabilities: unescaped user input in SSH project paths allows remote code execution on SSH hosts, and insufficient validation of SSH target parameters enables local command execution through malicious flag injection. An attacker can exploit these flaws to achieve arbitrary code execution either remotely via SSH or locally on the system running OpenClaw.

Ssh Command Injection AI / ML Openclaw
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-25055 HIGH PATCH This Week

n8n is an open source workflow automation platform. [CVSS 8.1 HIGH]

Ssh RCE AI / ML N8n
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-1803 HIGH POC This Week

Ziroom ZHOME A0101 devices running version 1.0.1.0 use hardcoded default credentials in the Dropbear SSH service, enabling unauthenticated remote attackers to gain unauthorized access with high impact to confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response. While exploitation requires specific conditions, security professionals should prioritize assessment and credential rotation for affected systems.

Ssh
NVD GitHub VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2024-5986 CRITICAL Act Now

Arbitrary file write in H2O-3 machine learning platform version 3.46.0.1 allows remote attackers to write data to any file on the server.

Ssh RCE AI / ML
NVD
CVSS 3.0
9.1
EPSS
0.1%
CVE-2025-59105 Monitor

With physical access to the device and enough time an attacker can desolder the flash memory, modify it and then reinstall it because of missing encryption.

Linux Windows Ssh SQLi
NVD
EPSS
0.0%
CVE-2025-59103 Monitor

with the restriction that the password is only randomized if the configured date versions up to 2022. contains a security vulnerability.

Linux Windows Ssh
NVD
EPSS
0.1%
CVE-2026-24058 CRITICAL PATCH Act Now

Soft Serve self-hosted Git server versions 0.11.2 and below have a critical authentication bypass that allows unauthenticated access to private repositories.

Ssh Authentication Bypass Soft Serve Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-1324 HIGH POC This Week

Operation And Maintenance Security Management System versions up to 3.0.12. is affected by command injection (CVSS 8.8).

Ssh Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.3%
CVE-2026-1102 MEDIUM This Month

Gitlab versions up to 18.6.4 is affected by allocation of resources without limits or throttling (CVSS 5.3).

Gitlab Ssh Denial Of Service
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-24049 HIGH POC PATCH This Week

Malicious wheel files can modify file permissions on critical system files during extraction in Python wheel versions 0.40.0-0.46.1, enabling attackers to alter SSH keys, configuration files, or executable scripts. This path traversal and permission manipulation flaw affects systems unpacking untrusted wheels and can lead to privilege escalation or arbitrary code execution. Public exploit code exists for this vulnerability, though a patch is available in version 0.46.2.

Python Ssh Privilege Escalation Wheel Redhat +1
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2021-47871 HIGH POC This Week

Hestia Control Panel 1.3.2 contains an arbitrary file write vulnerability that allows authenticated attackers to write files to arbitrary locations using the API index.php endpoint. [CVSS 8.8 HIGH]

PHP Ssh
NVD GitHub Exploit-DB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-20080 MEDIUM This Month

SSH service disruption in Cisco IEC6400 Wireless Backhaul Edge Compute Software allows unauthenticated remote attackers to trigger denial of service through connection flooding due to missing rate limiting protections. An attacker can render the SSH service unresponsive by launching a DoS attack against the SSH port, though other device operations remain functional during the attack. No patch is currently available.

Cisco Ssh Denial Of Service
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2021-47759 MEDIUM POC This Month

MTPutty 1.0.1.21 contains a sensitive information disclosure vulnerability that allows local attackers to view SSH connection passwords through Windows PowerShell process listing. [CVSS 6.2 MEDIUM]

Windows Ssh Information Disclosure
NVD Exploit-DB
CVSS 3.1
6.2
EPSS
0.0%
CVE-2025-12548 CRITICAL PATCH Act Now

Eclipse Che che-machine-exec exposes an unauthenticated JSON-RPC/WebSocket API on port 3333 that allows remote command execution and secret exfiltration from other users' developer workspace containers.

Ssh Authentication Bypass Redhat
NVD
CVSS 3.1
9.0
EPSS
0.3%
CVE-2024-54855 MEDIUM POC This Month

fabricators Ltd Vanilla OS 2 Core image v1.1.0 was discovered to contain static keys for the SSH service, allowing attackers to possibly execute a man-in-the-middle attack during connections with other hosts. [CVSS 6.4 MEDIUM]

Ssh Vanilla Os Core Image
NVD GitHub
CVSS 3.1
6.4
EPSS
0.0%
CVE-2026-22804 HIGH POC This Week

Stored XSS in Termix File Manager (versions 1.7.0-1.9.0) allows attackers with SSH server access to execute arbitrary JavaScript by uploading malicious SVG files that bypass content sanitization. When a Termix user previews the crafted file, the payload executes within the application context with full access to sensitive operations. Public exploit code exists and no patch is currently available.

Ssh XSS Termix
NVD GitHub
CVSS 3.1
8.0
EPSS
0.0%
CVE-2025-69426 Monitor

The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain hardcoded credentials for an operating system user account within an initialization script. The SSH service is network-accessible without IP-based restrictions. Although the configuration disables SCP and pseudo-TTY allocation, an attacker can authenticate using the hardcoded credentials and establish SSH local port forwarding to access the Docker socket. By mounting the host filesystem via Docker, an attacker can...

Docker Ssh IoT Command Injection
NVD
EPSS
0.0%
CVE-2025-68718 MEDIUM POC This Month

KAYSUS KS-WR1200 routers with firmware 107 expose SSH and TELNET services on the LAN interface with hardcoded root credentials (root:12345678). The administrator cannot disable these services or change the hardcoded password. [CVSS 5.4 MEDIUM]

Ssh Ks Wr1200 Firmware
NVD GitHub
CVSS 3.1
5.4
EPSS
0.1%
CVE-2025-68716 HIGH This Week

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. [CVSS 8.4 HIGH]

Ssh Ks Wr3600 Firmware
NVD GitHub
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-62877 CRITICAL Act Now

SUSE Harvester virtualization environment (1.5.x, 1.6.x) exposes the OS default SSH login password when using the interactive installer. This affects all hosts provisioned through the interactive method, potentially compromising entire virtualization clusters.

Ssh Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2025-15224 LOW POC PATCH Monitor

When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. [CVSS 3.1 LOW]

Ssh
NVD
CVSS 3.1
3.1
EPSS
0.1%
CVE-2025-15079 MEDIUM POC PATCH This Month

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. [CVSS 5.3 MEDIUM]

Ssh Information Disclosure Curl Suse
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2017-20214 HIGH POC This Week

FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH credentials that cannot be changed through normal camera operations. Attackers can leverage these persistent, unmodifiable credentials to gain unauthorized remote access to the thermal camera system. [CVSS 7.5 HIGH]

Ssh
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-61939 HIGH This Week

An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. [CVSS 8.8 HIGH]

Ssh Dns Weather Microserver Firmware
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2020-36915 HIGH POC This Week

Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcoded default credentials that allow unauthenticated remote access to web, telnet, and SSH interfaces. [CVSS 7.5 HIGH]

Ssh
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-21439 MEDIUM POC PATCH This Month

badkeys is a tool and library for checking cryptographic public keys for known vulnerabilities. [CVSS 5.3 MEDIUM]

Ssh Badkeys
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-64420 CRITICAL POC Act Now

Coolify through v4.0.0-beta.434 exposes the root user's SSH private key to low-privileged team members. Any user with basic access can extract the key, SSH to the server as root, and fully compromise the Coolify instance and all managed infrastructure. PoC available.

Ssh Coolify
NVD GitHub
CVSS 3.1
9.9
EPSS
0.1%
CVE-2025-67511 CRITICAL POC PATCH Act Now

A critical command injection vulnerability exists in the Cybersecurity AI (CAI) framework versions 0.5.9 and below, allowing attackers to execute arbitrary commands through unsanitized SSH parameters (username, host, port) in the run_ssh_command_with_credentials() function accessible to AI agents. The vulnerability has a publicly available proof-of-concept exploit and enables remote code execution with potential for complete system compromise, though real-world exploitation probability remains relatively low at 0.12% EPSS score despite the high CVSS rating of 9.6.

Command Injection Ssh AI / ML RCE Cybersecurity Ai
NVD GitHub VulDB
CVSS 3.1
9.6
EPSS
0.1%
CVE-2025-47913 HIGH POC PATCH This Month

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Ssh Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-7503 CRITICAL Act Now

CVE-2025-7503 is a security vulnerability (CVSS 10.0). Critical severity with potential for significant impact on affected systems.

RCE Privilege Escalation Authentication Bypass IoT Ssh
NVD GitHub
CVSS 4.0
10.0
EPSS
0.7%
CVE-2025-5689 HIGH PATCH This Week

Privilege escalation flaw in authd's temporary user record handling during pre-authentication NSS operations that causes first-time SSH login users to be incorrectly assigned root group membership within their session context. This allows authenticated users (PR:L) to gain elevated group privileges over the network (AV:N) with low complexity, affecting system confidentiality (C:H) and integrity (I:L). The vulnerability has a high CVSS score of 8.5, though real-world exploitation requires valid login credentials and depends on authentication infrastructure specifics.

Privilege Escalation Linux Ssh Authentication Bypass Authd +1
NVD GitHub
CVSS 3.1
8.5
EPSS
0.0%
CVE-2025-20261 HIGH This Week

Critical authentication bypass vulnerability in Cisco Integrated Management Controller (IMC) across multiple UCS server platforms that allows authenticated remote attackers to escalate privileges and access internal services with elevated permissions via crafted SSH syntax. The vulnerability affects UCS B-Series, C-Series, S-Series, and X-Series servers, enabling attackers to create administrator accounts and modify system configurations. With a CVSS score of 8.8 and low attack complexity requiring only valid credentials, this vulnerability poses significant risk to data center infrastructure and should be prioritized for patching.

Cisco Ssh Privilege Escalation
NVD
CVSS 3.1
8.8
EPSS
0.2%
CVE-2025-20163 HIGH This Week

Man-in-the-middle vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) caused by insufficient SSH host key validation, allowing unauthenticated remote attackers to impersonate NDFC-managed devices and intercept SSH traffic. This vulnerability affects Cisco NDFC deployments and could lead to credential capture and device impersonation with a CVSS score of 8.7 (High). Without confirmed KEV status or public POC availability noted in standard databases, organizations should prioritize patching based on CVSS severity and the network-accessible nature of the vulnerability (AV:N).

Information Disclosure Cisco Ssh Authentication Bypass Nexus Dashboard
NVD
CVSS 3.1
8.7
EPSS
0.0%
CVE-2025-48416 HIGH This Week

An OpenSSH daemon listens on TCP port 22. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Authentication Bypass Ssh
NVD
CVSS 3.1
8.1
EPSS
0.4%
CVE-2025-32728 MEDIUM PATCH This Month

In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding. Rated medium severity (CVSS 4.3), this vulnerability is no authentication required, low attack complexity.

Information Disclosure Ssh Openssh Debian Linux Redhat +1
NVD GitHub
CVSS 3.1
4.3
EPSS
0.3%
CVE-2025-27731 HIGH This Week

Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Microsoft Information Disclosure Ssh Windows 10 1809 Windows 10 21h2 +9
NVD
CVSS 3.1
7.8
EPSS
1.1%
CVE-2025-30095 CRITICAL Act Now

VyOS 1.3 through 1.5 (fixed in 1.4.2) or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Ssh Debian
NVD GitHub
CVSS 3.1
9.0
EPSS
0.3%
CVE-2025-26701 CRITICAL Act Now

Percona PMM Server OVA images ship with default service account credentials that grant SSH access and sudo to root, exposing all monitoring data and managed database credentials. The scope change reflects that compromising the monitoring server gives access to all monitored infrastructure.

Ssh Privilege Escalation Information Disclosure Authentication Bypass
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2025-26466 MEDIUM PATCH This Month

A flaw was found in the OpenSSH package. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. Epss exploitation probability 42.5% and no vendor patch available.

Microsoft Ssh Denial Of Service Openssh Ubuntu Linux +3
NVD
CVSS 3.1
5.9
EPSS
42.5%
CVE-2025-22869 HIGH PATCH This Week

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Allocation of Resources Without Limits vulnerability could allow attackers to exhaust system resources through uncontrolled allocation.

Microsoft Denial Of Service Ssh Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-26465 MEDIUM PATCH This Month

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, no authentication required. Epss exploitation probability 60.0%.

Information Disclosure Ssh Openssh Active Iq Unified Manager Ontap +5
NVD
CVSS 3.1
6.8
EPSS
60.0%
CVE-2026-35388
EPSS 0% CVSS 2.5
LOW Monitor

OpenSSH before 10.3 fails to confirm connection multiplexing in proxy-mode sessions, allowing local attackers with user interaction to bypass intended access controls and potentially manipulate multiplexed connections. The vulnerability affects OpenSSH versions prior to 10.3p1 and requires local access with user interaction (UI:R) on the affected system; while the CVSS score is low (2.5) and integrity impact is limited, the omission of confirmation mechanisms in proxy-mode multiplexing creates a logic flaw that could enable unauthorized session hijacking or redirection in multi-user environments.

Information Disclosure Ssh
NVD
CVE-2026-35387
EPSS 0% CVSS 3.1
LOW Monitor

OpenSSH before 10.3 incorrectly interprets ECDSA algorithm specifications in PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms configuration options, allowing authenticated users to authenticate using unintended ECDSA variants. The vulnerability requires authenticated network access and high attack complexity, resulting in a low CVSS score of 3.1 with integrity impact but no confidentiality or availability loss. No public exploit code or active exploitation has been documented.

Ssh Information Disclosure
NVD VulDB
CVE-2026-35386
EPSS 0% CVSS 3.6
LOW Monitor

OpenSSH before version 10.3 allows local privilege escalation through shell metacharacter injection in usernames when non-default ssh_config token expansion (%) is enabled. A local authenticated attacker with limited privileges can execute arbitrary commands by crafting a malicious username containing shell metacharacters, provided the system administrator has configured ssh_config to expand user-controlled tokens. This requires low user privileges and high attack complexity due to configuration constraints, but impacts confidentiality and integrity on affected systems.

Information Disclosure Ssh
NVD VulDB
CVE-2026-35414
EPSS 0% CVSS 4.2
MEDIUM This Month

OpenSSH before version 10.3 mishandles the authorized_keys principals option when a principals list is combined with a Certificate Authority that uses certain comma character patterns, allowing authenticated local or remote users to disclose sensitive authorization information or manipulate authentication decisions. This vulnerability affects all OpenSSH versions prior to 10.3p1 and requires authenticated access (PR:L) with non-trivial attack complexity (AC:H), resulting in partial confidentiality and integrity impact. No public exploit code or active exploitation has been identified at time of analysis.

Ssh Information Disclosure
NVD VulDB
CVE-2026-35385
EPSS 0% CVSS 7.5
HIGH This Week

OpenSSH's legacy scp protocol (pre-10.3) can install downloaded files with elevated setuid/setgid permissions when root users transfer files with -O flag without -p. This enables privilege escalation vectors if attackers control file server content or conduct man-in-the-middle attacks (CVSS AV:N/AC:H/UI:R). No public exploit identified at time of analysis, though exploitation probability is moderate given the specific configuration requirements (root usage, legacy protocol flag, missing preserve-mode flag).

Ssh Information Disclosure
NVD VulDB
CVE-2026-0964
EPSS 0% CVSS 5.0
MEDIUM PATCH This Month

SCP client implementations across Red Hat Enterprise Linux 6-10 and OpenShift Container Platform 4 are vulnerable to path traversal during file transfer, allowing a malicious SCP server to write files outside the designated working directory and potentially execute arbitrary code or modify system configuration. This vulnerability mirrors CVE-2019-6111 in OpenSSH; unauthenticated remote attackers can exploit it with high user interaction (the victim must initiate an SCP connection to a malicious server), resulting in confidentiality, integrity, and availability compromise. No public exploit code or active exploitation has been confirmed at the time of analysis.

Ssh Path Traversal
NVD
CVE-2026-23943
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

A remote code execution vulnerability (CVSS 6.9) that allows denial of service. Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Microsoft Denial Of Service Ssh +1
NVD VulDB GitHub
CVE-2025-67035
EPSS 0% CVSS 9.8
CRITICAL Act Now

Critical vulnerability in Lantronix EDS serial device server (EDS5000/EDS3000PS). Multiple injection and auth bypass vulnerabilities in the management interface.

Ssh
NVD VulDB
CVE-2025-41761
EPSS 0% CVSS 7.8
HIGH This Week

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo. [CVSS 7.8 HIGH]

Ssh Privilege Escalation Universal Bacnet Router Firmware
NVD
CVE-2026-30832
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

SSRF in Soft Serve Git server versions 0.6.0 to 0.11.3 allows authenticated attackers to make requests to internal services. PoC and patch available.

Ssh Soft Serve
NVD GitHub
CVE-2026-0847
EPSS 0% CVSS 8.6
HIGH PATCH This Week

Unauthorized file access in NLTK through path traversal flaws in multiple CorpusReader classes (versions up to 3.9.2) allows unauthenticated attackers to read arbitrary files on affected systems, potentially exposing SSH keys, API tokens, and other sensitive data. The vulnerability affects NLP applications and machine learning APIs that process user-controlled file inputs without proper validation. No patch is currently available.

Ssh RCE Path Traversal +3
NVD
CVE-2026-20009
EPSS 0% CVSS 5.3
MEDIUM This Month

Unauthenticated SSH authentication bypass in Cisco Secure Firewall ASA allows remote attackers to log in as arbitrary users by exploiting insufficient input validation during the SSH key authentication phase, requiring only knowledge of a valid username and its associated public key. This vulnerability enables attackers to execute arbitrary commands on affected ASA devices with the privileges of the compromised user account. No patch is currently available.

Cisco Ssh
NVD
CVE-2026-1627
EPSS 0% CVSS 6.5
MEDIUM This Month

Outdated MAC algorithms in SSH implementations for Mrs1000 and Lms1000 device firmware enable network-positioned attackers to tamper with session data integrity without user interaction. An attacker with network access can manipulate transmitted SSH traffic due to the use of cryptographically weak message authentication codes. No patch is currently available for affected devices.

Ssh Mrs1000 Firmware Lms1000 Firmware
NVD
CVE-2026-1626
EPSS 0% CVSS 6.5
MEDIUM This Month

Weak CBC cipher suite implementations in SSH services across SSH, LMS1000, and MRS1000 devices enable network-positioned attackers to observe or modify encrypted SSH traffic without authentication. The vulnerability requires user interaction and network access but poses a confidentiality risk to sensitive communications. No patch is currently available.

Ssh Lms1000 Firmware Mrs1000 Firmware
NVD
CVE-2026-25232
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Gogs is an open source self-hosted Git service. [CVSS 8.8 HIGH]

Ssh Privilege Escalation Gogs +1
NVD GitHub
CVE-2026-24126
EPSS 0% CVSS 6.6
MEDIUM PATCH This Month

Weblate versions up to 5.16.0 contains a vulnerability that allows attackers to an argument injection to `ssh-add` (CVSS 6.6).

Ssh Weblate Suse
NVD GitHub
CVE-2026-2618
EPSS 0% CVSS 3.7
LOW POC Monitor

A vulnerability was determined in Beetel 777VR1 up to 01.00.09. This impacts an unknown function of the component SSH Service. [CVSS 3.7 LOW]

Ssh
NVD VulDB GitHub
CVE-2026-23647
EPSS 0% CVSS 9.8
CRITICAL Act Now

Hardcoded OS credentials in Glory RBG-100 cash recycler systems using ISPK-08 software component. Physical cash handling equipment ships with known default credentials enabling complete system takeover.

Linux Ssh
NVD
CVE-2026-2617
EPSS 0% CVSS 6.3
MEDIUM POC This Month

The Beetel 777VR1 router's SSH/Telnet service contains insecure default initialization that allows local network attackers to achieve partial compromise of confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and the vendor has not released patches despite early notification. Affected devices running firmware version 01.00.09 and earlier require isolation from untrusted local networks until a security update becomes available.

Ssh Information Disclosure 777vr1 Firmware
NVD GitHub VulDB
CVE-2025-32063
EPSS 0% CVSS 6.8
MEDIUM This Month

There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vulnerability happens during the startup phase of a specific systemd service, and as a result, the following developer features will be activated: the disabled firewall and the launched SSH server. [CVSS 6.8 MEDIUM]

Ssh
NVD
CVE-2025-14282
EPSS 0% CVSS 5.4
MEDIUM This Month

A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote client as root, only switching to the logged-in user upon spawning a shell or performing some operations like reading the user's files. [CVSS 5.4 MEDIUM]

Ssh
NVD GitHub
CVE-2020-37136
EPSS 0% CVSS 7.5
HIGH POC This Week

ZOC Terminal 7.25.5 contains a denial of service vulnerability in the private key file input field that allows attackers to crash the application. [CVSS 7.5 HIGH]

Ssh Denial Of Service
NVD Exploit-DB
CVE-2026-25539
EPSS 1% CVSS 9.1
CRITICAL POC PATCH Act Now

SiYuan knowledge management system prior to 3.5.5 has a path traversal in /api/file/copyFile allowing arbitrary file operations on the server.

Ssh RCE Siyuan
NVD GitHub
CVE-2026-25499
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

The Terraform/OpenTofu Proxmox Provider prior to version 0.93.1 contains a path traversal vulnerability in its SSH sudoer configuration documentation that permits attackers to escape directory restrictions using ../ sequences and modify arbitrary files on the system. Public exploit code exists for this vulnerability, affecting users who implement the documented SSH configuration. The vulnerability has been patched in version 0.93.1 and a fix is available.

Ssh Proxmox Terraform Provider +1
NVD GitHub
CVE-2026-25157
EPSS 0% CVSS 7.7
HIGH PATCH This Week

OpenClaw AI assistant versions prior to 2026.1.29 contain two command injection vulnerabilities: unescaped user input in SSH project paths allows remote code execution on SSH hosts, and insufficient validation of SSH target parameters enables local command execution through malicious flag injection. An attacker can exploit these flaws to achieve arbitrary code execution either remotely via SSH or locally on the system running OpenClaw.

Ssh Command Injection AI / ML +1
NVD GitHub
CVE-2026-25055
EPSS 0% CVSS 8.1
HIGH PATCH This Week

n8n is an open source workflow automation platform. [CVSS 8.1 HIGH]

Ssh RCE AI / ML +1
NVD GitHub
CVE-2026-1803
EPSS 0% CVSS 8.1
HIGH POC This Week

Ziroom ZHOME A0101 devices running version 1.0.1.0 use hardcoded default credentials in the Dropbear SSH service, enabling unauthenticated remote attackers to gain unauthorized access with high impact to confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response. While exploitation requires specific conditions, security professionals should prioritize assessment and credential rotation for affected systems.

Ssh
NVD GitHub VulDB
CVE-2024-5986
EPSS 0% CVSS 9.1
CRITICAL Act Now

Arbitrary file write in H2O-3 machine learning platform version 3.46.0.1 allows remote attackers to write data to any file on the server.

Ssh RCE AI / ML
NVD
CVE-2025-59105
EPSS 0%
Monitor

With physical access to the device and enough time an attacker can desolder the flash memory, modify it and then reinstall it because of missing encryption.

Linux Windows Ssh +1
NVD
CVE-2025-59103
EPSS 0%
Monitor

with the restriction that the password is only randomized if the configured date versions up to 2022. contains a security vulnerability.

Linux Windows Ssh
NVD
CVE-2026-24058
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Soft Serve self-hosted Git server versions 0.11.2 and below have a critical authentication bypass that allows unauthenticated access to private repositories.

Ssh Authentication Bypass Soft Serve +1
NVD GitHub
CVE-2026-1324
EPSS 0% CVSS 8.8
HIGH POC This Week

Operation And Maintenance Security Management System versions up to 3.0.12. is affected by command injection (CVSS 8.8).

Ssh Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVE-2026-1102
EPSS 0% CVSS 5.3
MEDIUM This Month

Gitlab versions up to 18.6.4 is affected by allocation of resources without limits or throttling (CVSS 5.3).

Gitlab Ssh Denial Of Service
NVD
CVE-2026-24049
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

Malicious wheel files can modify file permissions on critical system files during extraction in Python wheel versions 0.40.0-0.46.1, enabling attackers to alter SSH keys, configuration files, or executable scripts. This path traversal and permission manipulation flaw affects systems unpacking untrusted wheels and can lead to privilege escalation or arbitrary code execution. Public exploit code exists for this vulnerability, though a patch is available in version 0.46.2.

Python Ssh Privilege Escalation +3
NVD GitHub
CVE-2021-47871
EPSS 0% CVSS 8.8
HIGH POC This Week

Hestia Control Panel 1.3.2 contains an arbitrary file write vulnerability that allows authenticated attackers to write files to arbitrary locations using the API index.php endpoint. [CVSS 8.8 HIGH]

PHP Ssh
NVD GitHub Exploit-DB
CVE-2026-20080
EPSS 0% CVSS 5.3
MEDIUM This Month

SSH service disruption in Cisco IEC6400 Wireless Backhaul Edge Compute Software allows unauthenticated remote attackers to trigger denial of service through connection flooding due to missing rate limiting protections. An attacker can render the SSH service unresponsive by launching a DoS attack against the SSH port, though other device operations remain functional during the attack. No patch is currently available.

Cisco Ssh Denial Of Service
NVD
CVE-2021-47759
EPSS 0% CVSS 6.2
MEDIUM POC This Month

MTPutty 1.0.1.21 contains a sensitive information disclosure vulnerability that allows local attackers to view SSH connection passwords through Windows PowerShell process listing. [CVSS 6.2 MEDIUM]

Windows Ssh Information Disclosure
NVD Exploit-DB
CVE-2025-12548
EPSS 0% CVSS 9.0
CRITICAL PATCH Act Now

Eclipse Che che-machine-exec exposes an unauthenticated JSON-RPC/WebSocket API on port 3333 that allows remote command execution and secret exfiltration from other users' developer workspace containers.

Ssh Authentication Bypass Redhat
NVD
CVE-2024-54855
EPSS 0% CVSS 6.4
MEDIUM POC This Month

fabricators Ltd Vanilla OS 2 Core image v1.1.0 was discovered to contain static keys for the SSH service, allowing attackers to possibly execute a man-in-the-middle attack during connections with other hosts. [CVSS 6.4 MEDIUM]

Ssh Vanilla Os Core Image
NVD GitHub
CVE-2026-22804
EPSS 0% CVSS 8.0
HIGH POC This Week

Stored XSS in Termix File Manager (versions 1.7.0-1.9.0) allows attackers with SSH server access to execute arbitrary JavaScript by uploading malicious SVG files that bypass content sanitization. When a Termix user previews the crafted file, the payload executes within the application context with full access to sensitive operations. Public exploit code exists and no patch is currently available.

Ssh XSS Termix
NVD GitHub
CVE-2025-69426
EPSS 0%
Monitor

The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain hardcoded credentials for an operating system user account within an initialization script. The SSH service is network-accessible without IP-based restrictions. Although the configuration disables SCP and pseudo-TTY allocation, an attacker can authenticate using the hardcoded credentials and establish SSH local port forwarding to access the Docker socket. By mounting the host filesystem via Docker, an attacker can...

Docker Ssh IoT +1
NVD
CVE-2025-68718
EPSS 0% CVSS 5.4
MEDIUM POC This Month

KAYSUS KS-WR1200 routers with firmware 107 expose SSH and TELNET services on the LAN interface with hardcoded root credentials (root:12345678). The administrator cannot disable these services or change the hardcoded password. [CVSS 5.4 MEDIUM]

Ssh Ks Wr1200 Firmware
NVD GitHub
CVE-2025-68716
EPSS 0% CVSS 8.4
HIGH This Week

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. [CVSS 8.4 HIGH]

Ssh Ks Wr3600 Firmware
NVD GitHub
CVE-2025-62877
EPSS 0% CVSS 9.8
CRITICAL Act Now

SUSE Harvester virtualization environment (1.5.x, 1.6.x) exposes the OS default SSH login password when using the interactive installer. This affects all hosts provisioned through the interactive method, potentially compromising entire virtualization clusters.

Ssh Suse
NVD GitHub
CVE-2025-15224
EPSS 0% CVSS 3.1
LOW POC PATCH Monitor

When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. [CVSS 3.1 LOW]

Ssh
NVD
CVE-2025-15079
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. [CVSS 5.3 MEDIUM]

Ssh Information Disclosure Curl +1
NVD
CVE-2017-20214
EPSS 0% CVSS 7.5
HIGH POC This Week

FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH credentials that cannot be changed through normal camera operations. Attackers can leverage these persistent, unmodifiable credentials to gain unauthorized remote access to the thermal camera system. [CVSS 7.5 HIGH]

Ssh
NVD Exploit-DB
CVE-2025-61939
EPSS 0% CVSS 8.8
HIGH This Week

An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. [CVSS 8.8 HIGH]

Ssh Dns Weather Microserver Firmware
NVD GitHub
CVE-2020-36915
EPSS 0% CVSS 7.5
HIGH POC This Week

Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcoded default credentials that allow unauthenticated remote access to web, telnet, and SSH interfaces. [CVSS 7.5 HIGH]

Ssh
NVD Exploit-DB
CVE-2026-21439
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

badkeys is a tool and library for checking cryptographic public keys for known vulnerabilities. [CVSS 5.3 MEDIUM]

Ssh Badkeys
NVD GitHub
CVE-2025-64420
EPSS 0% CVSS 9.9
CRITICAL POC Act Now

Coolify through v4.0.0-beta.434 exposes the root user's SSH private key to low-privileged team members. Any user with basic access can extract the key, SSH to the server as root, and fully compromise the Coolify instance and all managed infrastructure. PoC available.

Ssh Coolify
NVD GitHub
CVE-2025-67511
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

A critical command injection vulnerability exists in the Cybersecurity AI (CAI) framework versions 0.5.9 and below, allowing attackers to execute arbitrary commands through unsanitized SSH parameters (username, host, port) in the run_ssh_command_with_credentials() function accessible to AI agents. The vulnerability has a publicly available proof-of-concept exploit and enables remote code execution with potential for complete system compromise, though real-world exploitation probability remains relatively low at 0.12% EPSS score despite the high CVSS rating of 9.6.

Command Injection Ssh AI / ML +2
NVD GitHub VulDB
CVE-2025-47913
EPSS 0% CVSS 7.5
HIGH POC PATCH This Month

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Ssh Redhat +1
NVD GitHub
CVE-2025-7503
EPSS 1% CVSS 10.0
CRITICAL Act Now

CVE-2025-7503 is a security vulnerability (CVSS 10.0). Critical severity with potential for significant impact on affected systems.

RCE Privilege Escalation Authentication Bypass +2
NVD GitHub
CVE-2025-5689
EPSS 0% CVSS 8.5
HIGH PATCH This Week

Privilege escalation flaw in authd's temporary user record handling during pre-authentication NSS operations that causes first-time SSH login users to be incorrectly assigned root group membership within their session context. This allows authenticated users (PR:L) to gain elevated group privileges over the network (AV:N) with low complexity, affecting system confidentiality (C:H) and integrity (I:L). The vulnerability has a high CVSS score of 8.5, though real-world exploitation requires valid login credentials and depends on authentication infrastructure specifics.

Privilege Escalation Linux Ssh +3
NVD GitHub
CVE-2025-20261
EPSS 0% CVSS 8.8
HIGH This Week

Critical authentication bypass vulnerability in Cisco Integrated Management Controller (IMC) across multiple UCS server platforms that allows authenticated remote attackers to escalate privileges and access internal services with elevated permissions via crafted SSH syntax. The vulnerability affects UCS B-Series, C-Series, S-Series, and X-Series servers, enabling attackers to create administrator accounts and modify system configurations. With a CVSS score of 8.8 and low attack complexity requiring only valid credentials, this vulnerability poses significant risk to data center infrastructure and should be prioritized for patching.

Cisco Ssh Privilege Escalation
NVD
CVE-2025-20163
EPSS 0% CVSS 8.7
HIGH This Week

Man-in-the-middle vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) caused by insufficient SSH host key validation, allowing unauthenticated remote attackers to impersonate NDFC-managed devices and intercept SSH traffic. This vulnerability affects Cisco NDFC deployments and could lead to credential capture and device impersonation with a CVSS score of 8.7 (High). Without confirmed KEV status or public POC availability noted in standard databases, organizations should prioritize patching based on CVSS severity and the network-accessible nature of the vulnerability (AV:N).

Information Disclosure Cisco Ssh +2
NVD
CVE-2025-48416
EPSS 0% CVSS 8.1
HIGH This Week

An OpenSSH daemon listens on TCP port 22. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Authentication Bypass Ssh
NVD
CVE-2025-32728
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding. Rated medium severity (CVSS 4.3), this vulnerability is no authentication required, low attack complexity.

Information Disclosure Ssh Openssh +3
NVD GitHub
CVE-2025-27731
EPSS 1% CVSS 7.8
HIGH This Week

Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Microsoft Information Disclosure Ssh +11
NVD
CVE-2025-30095
EPSS 0% CVSS 9.0
CRITICAL Act Now

VyOS 1.3 through 1.5 (fixed in 1.4.2) or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Ssh Debian
NVD GitHub
CVE-2025-26701
EPSS 0% CVSS 10.0
CRITICAL Act Now

Percona PMM Server OVA images ship with default service account credentials that grant SSH access and sudo to root, exposing all monitoring data and managed database credentials. The scope change reflects that compromising the monitoring server gives access to all monitored infrastructure.

Ssh Privilege Escalation Information Disclosure +1
NVD
CVE-2025-26466
EPSS 43% CVSS 5.9
MEDIUM PATCH This Month

A flaw was found in the OpenSSH package. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. Epss exploitation probability 42.5% and no vendor patch available.

Microsoft Ssh Denial Of Service +5
NVD
CVE-2025-22869
EPSS 0% CVSS 7.5
HIGH PATCH This Week

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Allocation of Resources Without Limits vulnerability could allow attackers to exhaust system resources through uncontrolled allocation.

Microsoft Denial Of Service Ssh +2
NVD
CVE-2025-26465
EPSS 60% CVSS 6.8
MEDIUM PATCH This Month

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, no authentication required. Epss exploitation probability 60.0%.

Information Disclosure Ssh Openssh +7
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy