Severity: High
ID: 160810
File Name: newstart_cgsl_NS-SA-2022-0001_openssh-latest.nasl
Version: 1.3
Type: local
Published: 5/9/2022
Updated: 2/9/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 4.4
Temporal Score: 3.3
Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2021-41617
Risk Factor: High
Base Score: 7
Temporal Score: 6.1
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_main:openssh-latest, p-cpe:/a:zte:cgsl_main:openssh-latest-askpass, p-cpe:/a:zte:cgsl_main:openssh-latest-clients, p-cpe:/a:zte:cgsl_main:openssh-latest-debuginfo, p-cpe:/a:zte:cgsl_main:openssh-latest-keycat, p-cpe:/a:zte:cgsl_main:openssh-latest-server, cpe:/o:zte:cgsl_main:4
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 5/7/2022
Vulnerability Publication Date: 9/26/2021
CVE: CVE-2021-41617
IAVA: 2021-A-0474-S