Dear list member(s),

I've reviewed the list archives for the last two months since subcomponent 
release, and googled, but didn't find an answer for my question.

I'm encountering an issue with Tenable detecting a difference in version in our 
security scans indicating that OpenSSH is still at a vulnerable version.
Even though I have openssh 9.9p2-1 installed, some query methods show the 
version only as OpenSSH 9.9.
IF I login to my Cygwin installation and perform "ssh -V" I receive the 
expected correct up-to-date values in the response:
OpenSSH_9.9p2, OpenSSL 3.0.16 11 Feb 2025

However Tenable is performing a non-authenticated query against ssh that 
returns OpenSSH 9.9  (without the p2 appended to the end).
Then Tenable flags systems for remediation of what it detects as a vulnerable 
version.

If I initiate a command "ssh -vv <host ip>"  I can see the string where it 
reports the following:
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.9

I can also get this information via nmap or netcat (nc)
Nmap (v7.94) returns:
22/tcp open  ssh        OpenSSH 9.9 (protocol 2.0)

# nc <ip address> 22
SSH-2.0-OpenSSH_9.9

Is there a file that I can manipulate to resolve this, or can a new openssh 
package build be made that fixes the version output in response to these other 
query methods used by security scanners?

I look forward to any response or guidance.

Respectfully,
Ted Summers






-- 
Problem reports:      https://cygwin.com/problems.html
FAQ:                  https://cygwin.com/faq/
Documentation:        https://cygwin.com/docs.html
Unsubscribe info:     https://cygwin.com/ml/#unsubscribe-simple

Reply via email to