https://security.gd-linux.com/notice/NS-SA-2026-0036
Severity: Low
ID: 304047
File Name: newstart_cgsl_NS-SA-2026-0036_openssh.nasl
Version: 1.1
Type: local
Published: 3/28/2026
Updated: 3/28/2026
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.0
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P
CVSS Score Source: CVE-2025-61985
Risk Factor: Low
Base Score: 3.6
Temporal Score: 3.3
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_main:openssh-clients, p-cpe:/a:zte:cgsl_main:openssh-api, p-cpe:/a:zte:cgsl_main:openssh-keycat, p-cpe:/a:zte:cgsl_main:openssh-server, p-cpe:/a:zte:cgsl_main:openssh-core, p-cpe:/a:zte:cgsl_main:openssh, p-cpe:/a:zte:cgsl_main:openssh-askpass, cpe:/o:zte:cgsl_main:7, p-cpe:/a:zte:cgsl_main:openssh-clients-core, p-cpe:/a:zte:cgsl_main:openssh-sk-dummy, p-cpe:/a:zte:cgsl_main:openssh-doc, p-cpe:/a:zte:cgsl_main:openssh-server-core
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/27/2026
Vulnerability Publication Date: 10/6/2025
CVE: CVE-2025-61984, CVE-2025-61985
IAVA: 2025-A-0729-S, 2025-A-0806