SSH Protocol Vulnerability in Apple Mac OS X Terminal
CVE-2011-0189

Currently unrated

Key Information:

Vendor
Apple
Vendor
CVE Published:
23 March 2011

Summary

The default setup of the Terminal application in older versions of Apple Mac OS X (10.6 prior to 10.6.7) utilizes SSH protocol version 1 by default in its New Remote Connection dialog. This configuration can expose users to man-in-the-middle attacks, allowing malicious actors to impersonate trusted SSH servers. Attackers can exploit weaknesses in the outdated protocol to intercept and manipulate data transmitted during secure connections, potentially compromising sensitive information.

References

Timeline

  • Vulnerability Reserved

  • Vulnerability published

.