![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.80087 |
Category: | Useless services |
Title: | SSF Service |
Summary: | The SSF service is running on the target host. |
Description: | Summary: The SSF service is running on the target host. Vulnerability Insight: According to its banner, the remote SSH server is the SSF derivative. SSF had been written to be compliant with restrictive laws on cryptography in some European countries, France especially. These regulations have been softened and OpenSSH received a formal authorisation from the French administration in 2002 and the development of SSF has been discontinued. SSF is based upon an old version of OpenSSH and it implements an old version of the protocol. As it is not maintained anymore, it might be vulnerable to dangerous flaws. Solution: Remove SSF and install an up to date version of OpenSSH. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |