|
SSH security sessions using an outdated security protocol.
|
There are several serious vulnerabilities in SSH version 1. Best practice is to support the
latest version of the protocol to exploit the enhanced cryptography and features available in the
latest versions of the protocol. It is equally important to disable older versions of protocols to
protect against downgrade attacks where hackers force the use of an older version of the protocol
so that they can exploit it's vulnerabilities.
|
Copyright IBM Corp. and UNICOM Systems, Inc. 2019 All Rights Reserved
US Government Users Restricted Rights - Use, duplication or
disclosure restricted by GSA ADP Schedule Contract with
IBM Corp. and/or UNICOM Systems, Inc. Contact IBM
|
|
|