CCE-90953-1Platform: cpe:/o:centos:centos:7, cpe:/o:redhat:enterprise_linux:7 | Date: (C)2017-06-29 (M)2023-07-04 |
Only SSH protocol version 2 connections should be
permitted. The default setting in
'/etc/ssh/sshd_config' is correct, and can be
verified by ensuring that the following
line appears:
'Protocol 2'
Parameter:
[protocol_version_1/protocol_version_2]
Technical Mechanism:
SSH protocol version 1 suffers from design flaws that
result in security vulnerabilities and
should not be used.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 9.8 | Attack Vector: NETWORK |
Exploit Score: 3.9 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: NONE |
Severity: CRITICAL | User Interaction: NONE |
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:30607 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:31330 |