Details
SSH protocol version 1 suffers from design flaws that result in security vulnerabilities and should not be used. Only SSH protocol version 2 connections should be permitted.
Solution
From an SSH session connected to the ESXi host, or from the ESXi shell, add or correct the following line in '/etc/ssh/sshd_config':
Add or correct the following line in '/etc/ssh/sshd_config':
Protocol 2
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.
References
- 800-53|AC-17(2)
- CAT|I
- CCI|CCI-000068
- Rule-ID|SV-207612r378610_rule
- STIG-ID|ESXI-65-000011
- STIG-Legacy|SV-104055
- STIG-Legacy|V-93969
- Vuln-ID|V-207612
Comments
Please sign in to leave a comment.