Hi,
I've been digging through information in regards to the vulnerabilities in OpenSSH that were found during our vulnerability and penetration testing. We currently run R81.20 which has OpenSSH 7.8. I've also been reading some of the other posts in the community. OpenSSH upgrade R81.10 - Check Point CheckMates
Below OpenSSH 8.0 has the following CVE's reported.
CVE-2018-20685
CVE-2019-6109
CVE-2019-6110
CVE-2019-6111
Below OpenSSH 9.6 reports the follwing CVE's:
CVE-2023-48795
CVE-2023-51384
CVE-2023-51385
Now I've been reviewing SK65269 sk65269 - Status of OpenSSH CVEs and the list of OpenSSH CVE's. CheckPoint has indicated that some of these are deemed "Vulnerable - but not exploitable'
I wanted to raise the questions
1. What does "Vulnerable - but not exploitable" actually mean? Does it mean that even though the version is vulnerable, it cannot be exploited? If this is true, is there any other information or data available that supports this? On paper, to see the word 'vulnerable' even though it's not exploitable still raises questions and concerns for the higher ups on such a vague and somewhat seemingly contradictory response. The clarification's at the bottom do not have an explanation to this status.
2. Why is Check Point not actively updating these components? I get that some of the responses state that this is a low risk and that the odds of this ever being exploited are low, however, it has always been the practice that one of the best resolutions in cybersecurity for any vulnerability is to patch it. Again, I understand "low risk", but it's still "risk". Ideally we want to eliminate "risk" as much as possible. So why can't CheckPoint include the fixed OpenSSH versions and not have this come up? And at some point are they?