SSH Protocol Vulnerability in Apple Mac OS X Terminal
CVE-2011-0189
Currently unrated
Summary
The default setup of the Terminal application in older versions of Apple Mac OS X (10.6 prior to 10.6.7) utilizes SSH protocol version 1 by default in its New Remote Connection dialog. This configuration can expose users to man-in-the-middle attacks, allowing malicious actors to impersonate trusted SSH servers. Attackers can exploit weaknesses in the outdated protocol to intercept and manipulate data transmitted during secure connections, potentially compromising sensitive information.
References
Timeline
Vulnerability Reserved
Vulnerability published