Global web icon
nist.gov
https://nvd.nist.gov/vuln/detail/CVE-2025-48416
NVD - CVE-2025-48416
However, in the default SSH configuration the "PermitRootLogin" is disabled, preventing the root user from logging in via SSH. This configuration can be bypassed/changed by an attacker through multiple paths though.
Global web icon
nist.gov
https://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.…
Security of Interactive and Automated Access Management Using Secure ...
One of the greatest ongoing challenges to the security of SSH-based systems is the potential for human error due to the complexity of SSH management and the lack of knowledge many administrators have regarding secure SSH configuration and management.
Global web icon
nist.gov
https://nvd.nist.gov/vuln/detail/CVE-2023-48795
NVD - CVE-2023-48795
NVD - CVE-2023-48795Information Technology Laboratory
Global web icon
nist.gov
https://csrc.nist.gov/pubs/ir/7966/final
Security of Interactive and Automated Access Management Using Secure ...
This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.
Global web icon
nist.gov
https://csrc.nist.gov/CSRC/media/projects/cryptogr…
Nutanix Cryptographic Module for OpenSSH Server
(Nutanix) solutions to provide FIPS 140-2 Approved SSH server-side secure communication. ... oftware Module and [140IG] G.3 Partial Validations and Not rules enforced by the module are described in the appropriate context of this document.
Global web icon
nist.gov
https://csrc.nist.gov/csrc/media/projects/cryptogr…
Microsoft Word - UbuntuOpenSSH-Server-SecurityPolicy_v3.0.doc
The Crypto Officer shall follow this Security Policy to configure the operational environment and install the module to be operated as a FIPS 140-2 validated module.
Global web icon
nist.gov
https://nvd.nist.gov/vuln/detail/CVE-2025-26465
NVD - CVE-2025-26465
Weakness Enumeration ... Known Affected Software Configurations Switch to CPE 2.2 Configuration 1 ( hide ) ... Configuration 2 ( hide ) ... Denotes Vulnerable Software Are we missing a CPE here? Please let us know.
Global web icon
nist.gov
https://csrc.nist.gov/csrc/media/projects/cryptogr…
Microsoft Word - UbuntuOpenSSH-Client-SecurityPolicy_v3.0.doc
The Crypto Officer shall follow this Security Policy to configure the operational environment and install the module to be operated as a FIPS 140-2 validated module.
Global web icon
nist.gov
https://nvd.nist.gov/vuln/detail/CVE-2025-61984
NVD - CVE-2025-61984
Information Technology Laboratory National Vulnerability DatabaseVulnerabilities
Global web icon
nist.gov
https://nvd.nist.gov/vuln/detail/CVE-2025-30095
NVD - CVE-2025-30095
Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service.