Dropbear Ssh
Standard maintenance is sufficient
Dropbear Ssh has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
23.1%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 13 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2023-48795 | 5.9 | 56.7% | — |
| CVE-2016-3116 | 6.4 | 27.6% | — |
| CVE-2016-7406 | 9.8 | 25.3% | — |
| CVE-2017-9078 | 8.8 | 5.2% | — |
| CVE-2016-7408 | 8.8 | 1.5% | — |
| CVE-2016-7407 | 9.8 | 1.0% | — |
| CVE-2020-36254 | 8.1 | 0.6% | — |
| CVE-2018-15599 | 5.3 | 0.5% | — |
| CVE-2017-2659 | 5.3 | 0.3% | — |
| CVE-2019-12953 | 5.3 | 0.3% | — |
| CVE-2021-36369 | 7.5 | 0.1% | — |
| CVE-2016-7409 | 5.5 | 0.1% | — |
| CVE-2017-9079 | 4.7 | 0.1% | — |
16
/ 100
low-risk
Active Threat
16/50 · Low
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.