
Cloud Vulnerability DB
A community-led vulnerabilities database
SSH Tectia Client and Server versions prior to 6.4.19 running on Windows contain a local privilege escalation vulnerability in nonstandard conditions. The vulnerability, identified as CVE-2021-27893, was discovered by Etienne Côté from KPMG-Egyde and affects both SSH Tectia Client/Server and ConnectSecure installations on Windows platforms (SSH Advisory).
The vulnerability is classified as a local privilege escalation issue that requires specific nonstandard conditions to be exploited. The vulnerability has been assigned a CVSS v3.1 score of 7.0 HIGH, indicating significant severity (NVD).
If successfully exploited, this vulnerability could allow an attacker with local access to escalate their privileges on affected Windows systems running SSH Tectia Client and Server or ConnectSecure (SSH Advisory).
The recommended mitigation is to upgrade all affected Windows installations of Tectia Client and Server to version 6.4.19. This version is part of the 6.4 LTS stream and will be supported until March 2023. Users with valid support contracts can obtain the update through the customer download center (SSH Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."