
Cloud Vulnerability DB
A community-led vulnerabilities database
SSH Tectia Server before version 6.6.6 contains a vulnerability (CVE-2025-32942) that was disclosed on April 11th, 2025. This security flaw affects Tectia Server installations on Windows, Linux, and UNIX platforms, while Tectia Client and Tectia z/OS installations remain unaffected (SSH Advisory).
The vulnerability has received a CVSS 3.1 Base Score of 7.2 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L. The flaw requires an attacker to have control over both TCP traffic and an account on the target system to potentially gain man-in-the-middle privileges (NVD, SSH Advisory).
When successfully exploited, the vulnerability allows attackers to read and alter a user's session traffic in worst-case scenarios. The impact varies depending on the client's activities (SSH Advisory).
No temporary mitigations are available. The only remediation is to upgrade Tectia Server installations to the fixed versions released on June 12th, 2025: 6.4.21, 6.5.3, 6.6.6, or 7.0.0 and later (SSH Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."