During a vulnerability scan (Qualsys, Tenable, Nessus, etc.), vulnerabilities are reported with OpenSSH on ESXi. Example vulnerabilities for OpenSSH are:
After receiving vulnerabilty reports from the scanner, checking the OpenSSH version on the ESXi host will help clarify if the host is possibly impacted when reading the public CVE documentation about the possible vulnerabilities.
VMware ESXi host 8.X
VMware ESXi host7.X
This behavior is largely due to vulnerability scanners referencing configuration files or other static files to detected hard-coded versions, while frequently overlooking the patch levels of installed packages.
To validate the version of OpenSSH, the following command can be used:ssh -V
The output is as follows:OpenSSH_9.8p1, OpenSSL 3.0.15 3 Sep 2024This shows not only the major version (9.8) but also shows any patches that have been applied (p1 in this case).
If you get a report for an OpenSSH vulnerability, take the following steps:
Japanese KB: 脆弱性スキャンで脆弱性の可能性が報告されている場合に ESXi 上の openSSH バージョンを見つける方法