Customer vulnerability scanners detects below OpenSSH vulnerabilities.
CVE-2023-51384 priority is medium (CVSS score between 4 and 7)
CVE-2023-51385 priority is medium (CVSS score between 4 and 7)
CVE-2019-16905, CVE-2020-15778 priority is High (CVSS score is above 7)
CVE-2023-48795, CVE-2020-14145, CVE-2018-20685, CVE-2019-6109, CVE-2019-6110, CVE-2019-6111, CVE-2018-15919, CVE-2016-20012 priority is medium (CVSS score between 4 and 7)
CVE-2025-26465 priority is medium (CVSS score between 4 and 7)
CVE-2025-23419 priority is medium (CVSS score 5)
VMware vCenter Sever 8.x
VROPs 8.18.1
VRO 8.18.1
vROPS remote collecter 8.18.
VRLI 8.18
TCA 3.2
Airgap 3.2
Harbor 2.6.x
VIO 7.x
Below are the CVE details with the fix.
8u3d | CVE-2023-51384, CVE-2023-51385 |
Fixed in vCenter 8.0 U3 update openssh-clients-8.9p1-8.ph4 CVE-2023-51385 is fixed and not present CVE-2023-51384 is fixed and not present |
3.2 | Airgap openssh-8.9p1-8.ph4 CVE-2023-51385 is fixed and not present in TCA 3.2 Patch (3.2.0.1) CVE-2023-51384 is fixed and not present in TCA 3.2 Patch (3.2.0.1) CVE-2025-23419 This vulnerability, applies to nginx versions 1.11.4 through 1.27.3 when configured to use TLSv1.3 with session resumption enabled through ssl_session_cache or ssl_session_tickets.Although the Airgap Server (version 3.2.0.1) utilizes nginx 1.26.2, its default configuration enforces the use of TLSv1.2 rather than the affected TLSv1.3. As a result, Airgap 3.2 environment is not impacted by CVE-2025-23419, and no remediation is needed.You may verify the TLS version configured on the Airgap Server using the following commands:grep -i tls /etc/nginx/nginx.conf.Expected Output should be ssl_protocols TLSv1.2; |
|
3.2 | CVE-2023-51384, CVE-2023-51385 |
|
8.18.1 | CVE-2023-51384, CVE-2023-51385 |
|
8.18.1 | CVE-2023-51384, CVE-2023-51385 |
|
8.18.1 | CVE-2023-51384, CVE-2023-51385 |
|
8.18 | CVE-2023-51384, CVE-2023-51385 |
|
2.6.3 | CVE-2019-16905, CVE-2020-15778 CVE-2023-48795, CVE-2020-14145, CVE-2023-51385, CVE-2023-51384 CVE-2018-20685, CVE-2019-6109, CVE-2019-6110, CVE-2019-6111, CVE-2018-15919, CVE-2016-20012 |
Harbor version v2.6.3-1297af6c is vm shell and is not provided by VMware/ Broadcom. because of which the reported 2 vulnerabilities are not applicable. The newer supported versions of harbor are provided via CN solution, and these do not these vulnerabilities. |
2.6 | CVE-2025-26465 | Harbor version v2.6 is vm shell and is not provided by VMware/ Broadcom. Users are typically downloading a Photon OS from public repositories and setting that up. VMWare/Broadcom do not need to provide workarounds / fixes for those. VMWare/Broadcom own Harbor 2.9 onwards (CNF method). Users are free to apply generic Linux recommendations for prior versions. |
7.x | PHSA-2019-3.0-0003 CVE-2018-20685 PHSA-2019-3.0-0014 CVE-2019-6109, CVE-2019-6111 PHSA-2019-3.0-0017 CVE-2019-6110 PHSA-2023-3.0-0705 CVE-2023-51385 |
These issues with openssh will be addressed with openssh-7.8p1-18. If the package returned is less than openssh-7.8p1-18 (see Additional Information) run the following:
|
Run the following command to verify the version being used in the environment.
Login via root and output the full version of SSH in the Product via,
#rpm -qa | grep openssh
Then look at the patch version and compare it here
#rpm -qa | grep openssh