SSH

NewsSecurity Vulnerabilities

Unauthenticated Remote Code Execution in Erlang/OTP SSH (CVE-2025-32433)

A serious vulnerability (CVE-2025-32433) has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE).

Read More
NewsSecurity Vulnerabilities

Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server (CVE-2025-32433)

On April 16th 2025, a critical vulnerability in the Erlang/OTP SSH server was disclosed. This vulnerability could allow an unauthenticated, remote attacker to perform remote code execution (RCE) on an affected device.

Read More
Security NewsNews

Over 16,400 Private and State-Owned Businesses Exposed to RegreSSHion Vulnerability

A critical security flaw known as RegreSSHion (CVE-2024-6387) has put over 16,400 global organizations at risk of remote compromise, according to

Read More
Security VulnerabilitiesNews

Cisco Policy Suite Static SSH Keys Vulnerability [CVE-2021-40119]

CVE number = CVE-2021-40119 A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated,

Read More
Security VulnerabilitiesNews

FortiSIEM default SSH key vulnerability

A use of hard-coded cryptographic key vulnerability in FortiSIEM may allow a remote unauthenticated attacker to obtain SSH access to

Read More
Security VulnerabilitiesNews

libssh2 SSH Packet Processing Out-of-Bounds Read Vulnerability [CVE-2019-3861]

CVE Number – CVE-2019-3861 A vulnerability in libssh2 could allow an unauthenticated, remote attacker to access sensitive information or cause

Read More
Security Vulnerabilities

MitraStar DSL-100HN-T1/GPT-2541GNAC – Privilege Escalation

Models affected: MitraStar DSL-100HN-T1 and MitraStar GPT-2541GNAC (HGU) Software versions: ES_113WJY0b16 (DSL-100HN-T1) and 1.00(VNJ0)b1 (GPT-2541GNAC) Vulnerability analysis: http://jolama.es/temas/router-attack/index.php Description SSH

Read More
Security Vulnerabilities

SSH Private Key Scanning On the Rise

Threat actors are actively scanning web servers to find private Secure Shell (SSH) keys. The increase in this type of

Read More