ssh CVE Vulnerabilities & Metrics

Focus on ssh vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About ssh Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with ssh. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total ssh CVEs: 5
Earliest CVE date: 22 Jan 1998, 05:00 UTC
Latest CVE date: 06 Aug 2024, 14:16 UTC

Latest CVE reference: CVE-2024-30170

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical ssh CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.89

Max CVSS: 10.0

Critical CVEs (≥9): 4

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 19
7.0-8.9 18
9.0-10.0 4

CVSS Distribution Chart

Top 5 Highest CVSS ssh CVEs

These are the five CVEs with the highest CVSS scores for ssh, sorted by severity first and recency.

All CVEs for ssh

CVE-2024-30170 ssh vulnerability CVSS: 0 06 Aug 2024, 14:16 UTC

PrivX before 34.0 allows data exfiltration and denial of service via the REST API. This is fixed in minor versions 33.1, 32.3, 31.3, and later, and in major version 34.0 and later,

CVE-2023-48795 ssh vulnerability CVSS: 0 18 Dec 2023, 16:15 UTC

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

CVE-2021-27893 ssh vulnerability CVSS: 4.4 15 Mar 2021, 15:15 UTC

SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected.

CVE-2021-27892 ssh vulnerability CVSS: 4.6 15 Mar 2021, 15:15 UTC

SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected.

CVE-2021-27891 ssh vulnerability CVSS: 6.5 15 Mar 2021, 15:15 UTC

SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected.

CVE-2012-5975 ssh vulnerability CVSS: 9.3 04 Dec 2012, 23:55 UTC

The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.

CVE-2011-0766 ssh vulnerability CVSS: 7.8 31 May 2011, 20:55 UTC

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

CVE-2008-5161 ssh vulnerability CVSS: 2.6 19 Nov 2008, 17:30 UTC

Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.

CVE-2007-5616 ssh vulnerability CVSS: 7.2 09 Jan 2008, 21:46 UTC

ssh-signer in SSH Tectia Client and Server 5.x before 5.2.4, and 5.3.x before 5.3.6, on Unix and Linux allows local users to gain privileges via unspecified vectors.

CVE-2007-2063 ssh vulnerability CVSS: 4.4 18 Apr 2007, 03:19 UTC

SSH Tectia Server for IBM z/OS before 5.4.0 uses insecure world-writable permissions for (1) the server pid file, which allows local users to cause arbitrary processes to be stopped, or (2) when _BPX_BATCH_UMASK is missing from the environment, creates HFS files with insecure permissions, which allows local users to read or modify these files and have other unknown impact.

CVE-2006-5484 ssh vulnerability CVSS: 5.0 24 Oct 2006, 22:07 UTC

SSH Tectia Client/Server/Connector 5.1.0 and earlier, Manager 2.2.0 and earlier, and other products, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents Tectia from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339.

CVE-2006-4315 ssh vulnerability CVSS: 7.2 23 Aug 2006, 22:04 UTC

Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server before 4.4.5, and Manager 2.12 and earlier, when running on Windows, might allow local users to gain privileges via a malicious program file under "Program Files" or its subdirectories.

CVE-2006-4316 ssh vulnerability CVSS: 7.2 23 Aug 2006, 22:04 UTC

SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the "Restart" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user's program and restart it with root privileges.

CVE-2005-4310 ssh vulnerability CVSS: 7.5 17 Dec 2005, 00:03 UTC

SSH Tectia Server 5.0.0 (A, F, and T), when allowing host-based authentication only, allows users to log in with the wrong credentials.

CVE-2005-2146 ssh vulnerability CVSS: 4.6 05 Jul 2005, 04:00 UTC

SSH Tectia Server 4.3.1 and earlier, and SSH Secure Shell for Windows Servers, uses insecure permissions when generating the Secure Shell host identification key, which allows local users to access the key and spoof the server.

CVE-2003-1119 ssh vulnerability CVSS: 5.0 31 Dec 2003, 05:00 UTC

SSH Secure Shell before 3.2.9 allows remote attackers to cause a denial of service via malformed BER/DER packets.

CVE-2003-1120 ssh vulnerability CVSS: 3.7 31 Dec 2003, 05:00 UTC

Race condition in SSH Tectia Server 4.0.3 and 4.0.4 for Unix, when the password change plugin (ssh-passwd-plugin) is enabled, allows local users to obtain the server's private key.

CVE-2002-1646 ssh vulnerability CVSS: 7.5 31 Dec 2002, 05:00 UTC

SSH Secure Shell for Servers 3.0.0 to 3.1.1 allows remote attackers to override the AllowedAuthentications configuration and use less secure authentication schemes (e.g. password) than configured for the server.

CVE-2002-1715 ssh vulnerability CVSS: 7.2 31 Dec 2002, 05:00 UTC

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

CVE-2002-1645 ssh vulnerability CVSS: 10.0 25 Nov 2002, 05:00 UTC

Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL.

CVE-2002-1644 ssh vulnerability CVSS: 7.2 25 Nov 2002, 05:00 UTC

SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.

CVE-2001-0572 ssh vulnerability CVSS: 7.5 22 Aug 2001, 04:00 UTC

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.

CVE-2001-0553 ssh vulnerability CVSS: 7.2 14 Aug 2001, 04:00 UTC

SSH Secure Shell 3.0.0 on Unix systems does not properly perform password authentication to the sshd2 daemon, which allows local users to gain access to accounts with short password fields, such as locked accounts that use "NP" in the password field.

CVE-2001-0471 ssh vulnerability CVSS: 7.5 27 Jun 2001, 04:00 UTC

SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack.

CVE-2001-0364 ssh vulnerability CVSS: 5.0 27 Jun 2001, 04:00 UTC

SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections.

CVE-2001-0361 ssh vulnerability CVSS: 4.0 27 Jun 2001, 04:00 UTC

Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.

CVE-2001-0259 ssh vulnerability CVSS: 3.6 02 Jun 2001, 04:00 UTC

ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file.

CVE-2001-0144 ssh vulnerability CVSS: 10.0 12 Mar 2001, 05:00 UTC

CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.

CVE-2001-1473 ssh vulnerability CVSS: 7.5 18 Jan 2001, 05:00 UTC

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.

CVE-2001-1475 ssh vulnerability CVSS: 7.5 18 Jan 2001, 05:00 UTC

SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated.

CVE-2001-1476 ssh vulnerability CVSS: 7.5 18 Jan 2001, 05:00 UTC

SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not.

CVE-2001-1469 ssh vulnerability CVSS: 5.0 18 Jan 2001, 05:00 UTC

The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message's cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified.

CVE-2001-1470 ssh vulnerability CVSS: 5.0 18 Jan 2001, 05:00 UTC

The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message.

CVE-2001-1474 ssh vulnerability CVSS: 5.0 18 Jan 2001, 05:00 UTC

SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client's DNS cache.

CVE-2000-0992 ssh vulnerability CVSS: 5.0 19 Dec 2000, 05:00 UTC

Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.

CVE-2000-0575 ssh vulnerability CVSS: 7.2 05 Jul 2000, 04:00 UTC

SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS.

CVE-2000-0217 ssh vulnerability CVSS: 5.1 24 Feb 2000, 05:00 UTC

The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.

CVE-2000-0143 ssh vulnerability CVSS: 4.6 11 Feb 2000, 05:00 UTC

The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.

CVE-1999-0787 ssh vulnerability CVSS: 2.1 17 Sep 1999, 04:00 UTC

The SSH authentication agent follows symlinks via a UNIX domain socket.

CVE-1999-1231 ssh vulnerability CVSS: 5.0 09 Jun 1999, 04:00 UTC

ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.

CVE-1999-1029 ssh vulnerability CVSS: 7.5 13 May 1999, 04:00 UTC

SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.

CVE-1999-0248 ssh vulnerability CVSS: 10.0 01 Jan 1999, 05:00 UTC

A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials.

CVE-1999-0398 ssh vulnerability CVSS: 4.6 01 Jan 1999, 05:00 UTC

In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.

CVE-1999-1159 ssh vulnerability CVSS: 4.6 29 Dec 1998, 05:00 UTC

SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.

CVE-1999-0310 ssh vulnerability CVSS: 7.5 01 Sep 1998, 04:00 UTC

SSH 1.2.25 on HP-UX allows access to new user accounts.

CVE-1999-1085 ssh vulnerability CVSS: 5.0 12 Jun 1998, 04:00 UTC

SSH 1.2.25, 1.2.23, and other versions, when used in in CBC (Cipher Block Chaining) or CFB (Cipher Feedback 64 bits) modes, allows remote attackers to insert arbitrary data into an existing stream between an SSH client and server by using a known plaintext attack and computing a valid CRC-32 checksum for the packet, aka the "SSH insertion attack."

CVE-1999-0013 ssh vulnerability CVSS: 7.5 22 Jan 1998, 05:00 UTC

Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.