Critical SSH vulnerabilities expose enterprise network infrastructure as patching lags

Tags:

The Secure Shell (SSH) protocol serves as the backbone of modern network administration, providing encrypted remote access to virtually every server, network device and embedded system in enterprise environments. From routers and switches to industrial control systems and cloud instances, SSH has become the de facto standard for secure command-line access across infrastructure.

This ubiquity makes recent findings from security researcher HD Moore particularly alarming. At the DEF CON 33 conference, Moore, who is the founder and CEO of runZero, presented results from his firm’s internet-wide scanning that revealed persistent vulnerabilities across SSH implementations, affecting major networking vendors. The research also identified critical security gaps in industrial equipment, file transfer solutions, and countless network appliances that form the foundation of enterprise connectivity.

“If I look at SSH across the internet, it is actually the second-most-common admin protocol exposed on the internet behind HTTP,” Moore said. “So there’s more SSH out there than there is almost anything else.”

Continue reading on Network World.

Categories

No Responses

Leave a Reply

Your email address will not be published. Required fields are marked *