{"id":54986,"date":"2024-01-04T13:17:12","date_gmt":"2024-01-04T13:17:12","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35361\/Millions-Still-Havent-Patched-Terrapin-SSH-Protocol-Vulnerability.html"},"modified":"2024-01-04T13:17:12","modified_gmt":"2024-01-04T13:17:12","slug":"millions-still-havent-patched-terrapin-ssh-protocol-vulnerability","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/","title":{"rendered":"Millions Still Haven&#8217;t Patched Terrapin SSH Protocol Vulnerability"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/server-admin-800x534.jpg\" alt=\"Millions still haven\u2019t patched Terrapin SSH protocol vulnerability\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/security\/2024\/01\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">29<\/span> <\/a> <\/aside>\n<p> <!-- cache hit 140:single\/related:4c7d881c5032a9866f6a5b632300d565 --><!-- empty --><\/p>\n<p>Roughly 11 million Internet-exposed servers remain susceptible to a recently discovered vulnerability that allows attackers with a foothold inside affected networks. Once they&#8217;re in, attackers compromise the integrity of SSH sessions that form the lynchpin for admins to securely connect to computers inside the cloud and other sensitive environments.<\/p>\n<p>Terrapin, as the vulnerability has been named, <a href=\"https:\/\/arstechnica.com\/security\/2023\/12\/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack\/\">came to light<\/a> two weeks ago in a research paper published by academic researchers. Tracked as CVE-2023-48795, the attack the researchers devised works when attackers have an adversary-in-the-middle attack (also abbreviated as AitM and known as man-in-the-middle or MitM), such as when they\u2019re positioned on the same local network and can secretly intercept communications and assume the identity of both the recipient and the sender.<\/p>\n<p>In those instances, Terrapin allows attackers to alter or corrupt information transmitted in the SSH data stream during the handshake\u2014the earliest connection stage, when the two parties negotiate the encryption parameters they will use to establish a secure connection. As such, Terrapin represents the first practical cryptographic attack targeting the integrity of the SSH protocol itself. It works by targeting BPP (<a href=\"https:\/\/arstechnica.com\/security\/2024\/01\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/link\">Binary Packet Protocol),<\/a> which is designed to ensure AitMs can\u2019t add or drop messages exchanged during the handshake. This <a href=\"https:\/\/www.scribd.com\/document\/59627915\/Ssh-Security\">prefix truncation<\/a> attack works when implementations support either the &#8220;ChaCha20-Poly1305&#8221; or &#8220;CBC with Encrypt-then-MAC,&#8221; cipher modes, which, at the time the paper was published, was found in 77 percent of SSH servers.<\/p>\n<p>Internet-wide scans performed Tuesday, the last day such data was available at the time of reporting, revealed that more than 11 million IP addresses exposing an SSH server remained vulnerable to Terrapin. Nearly a third of those addresses, 3.3 million, resided in the US, followed by China, Russia, Germany, Russia and Singapore. All of the unpatched implementations tracked by Shadowserver supported the required cipher modes.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/statistics-tree-map.png\" class=\"enlarge\" data-height=\"739\" data-width=\"1300\" alt=\"Tree map for CVE-2023-48795.\"><img loading=\"lazy\" decoding=\"async\" alt=\"Tree map for CVE-2023-48795.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/statistics-tree-map-640x364.png\" width=\"640\" height=\"364\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/statistics-tree-map-1280x728.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/statistics-tree-map.png\" class=\"enlarge-link\" data-height=\"739\" data-width=\"1300\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Tree map for CVE-2023-48795.<\/div>\n<\/figcaption><\/figure>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/map.png\" class=\"enlarge\" data-height=\"721\" data-width=\"1374\" alt=\"World map of countries unpatched against CVE-2023-48795.\"><img loading=\"lazy\" decoding=\"async\" alt=\"World map of countries unpatched against CVE-2023-48795.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/map-640x336.png\" width=\"640\" height=\"336\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/map-1280x672.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/map.png\" class=\"enlarge-link\" data-height=\"721\" data-width=\"1374\">Enlarge<\/a> <span class=\"sep\">\/<\/span> World map of countries unpatched against CVE-2023-48795.<\/div>\n<div class=\"caption-credit\">Shadowserver<\/div>\n<\/figcaption><\/figure>\n<p>Only 53 of the vulnerable instances relied on implementations of AsyncSSH, the only app currently known to be seriously affected by Terrapin. Two vulnerabilities the researchers discovered in AsyncSSH allowed Terrapin to (1) downgrade security extensions that organizations to replace the extension information message sent by the server, letting the attacker control its content or (2) control the remote end of an SSH client session by either injecting or removing packets or emulating the shell established. AsyncSSH has patched those two vulnerabilities, tracked as CVE-2023-46445 and CVE-2023-46446, in addition to CVE-2023-48795, the Terrapin vulnerability affecting the SSH protocol. It appears the overwhelming majority of AsyncSSH users have installed the patches.<\/p>\n<p>The requirement of an AitM position and the lack of currently known practical attacks made possible by Terrapin are important mitigating factors that <a href=\"https:\/\/arstechnica.com\/security\/2024\/01\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/link\">some critics say<\/a> have been lost in some news coverage. That said, at this stage, there are few good reasons not to have patched the protocol flaw by now, since patches became widely available about one to two weeks ago.<\/p>\n<p>\u201cThe attack requires quite a bit of complexity in that MitM is necessary, so that will limit practical application to more targeted attacks in our view,\u201d Piotr Kijewski, a Shadowserer researcher, wrote in an email to Ars. \u201cSo unlikely to have this mass-exploited. Still, the sheer mass of vulnerable instances suggests this vulnerability will be with us for years to come and that in itself makes it attractive in some specific cases.\u201d<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<div class=\"centered-figure-container\">\n<figure class=\"center\"><figcaption class=\"caption\">\n<div class=\"caption-text\">Optional caption<\/div>\n<\/figcaption><\/figure>\n<\/div>\n<p>While it\u2019s unlikely that Terrapin will ever be mass-exploited, the potential remains for it to be used in targeted attacks by more sophisticated attackers, such as those backed by nation-states. Despite earlier versions of AsyncSSH being the only known application vulnerable to practical Terrapin attacks, the researchers spent little time analyzing other implementations. Adversaries with more time, resources, and motivation could identify other vulnerable implementations.<\/p>\n<p>Kijewski listed the top 50 banners displayed by vulnerable IP addresses as:<\/p>\n<ul>\n<li aria-level=\"1\">serverid_software &nbsp; count<\/li>\n<li aria-level=\"1\">openssh_7.4 2878009<\/li>\n<li aria-level=\"1\">openssh_7.6p1 &nbsp; 956296<\/li>\n<li aria-level=\"1\">openssh_8.2p1 &nbsp; 802582<\/li>\n<li aria-level=\"1\">openssh_8.0 758138<\/li>\n<li aria-level=\"1\">openssh_7.9p1 &nbsp; 718727<\/li>\n<li aria-level=\"1\">openssh_8.4p1 &nbsp; 594147<\/li>\n<li aria-level=\"1\">openssh_8.9p1 &nbsp; 460595<\/li>\n<li aria-level=\"1\">openssh_7.2p2 &nbsp; 391769<\/li>\n<li aria-level=\"1\">openssh_7.4p1 &nbsp; 320805<\/li>\n<li aria-level=\"1\">openssh_8.5 316462<\/li>\n<li aria-level=\"1\">openssh_9.3 298626<\/li>\n<li aria-level=\"1\">openssh_8.7 219381<\/li>\n<li aria-level=\"1\">openssh_6.7p1 &nbsp; 156758<\/li>\n<li aria-level=\"1\">openssh_9.2p1 &nbsp; 141010<\/li>\n<li aria-level=\"1\">openssh_6.6.1p1 136489<\/li>\n<li aria-level=\"1\">openssh_9.0 112179<\/li>\n<li aria-level=\"1\">openssh_6.6.1 &nbsp; 105423<\/li>\n<li aria-level=\"1\">dropbear_2020.80&nbsp; &nbsp; 93154<\/li>\n<li aria-level=\"1\">openssh_8.8 88284<\/li>\n<li aria-level=\"1\">openssh_7.5 76034<\/li>\n<li aria-level=\"1\">aws_sftp_1.1 75157<\/li>\n<li aria-level=\"1\">openssh_9.0p1 &nbsp; 70305<\/li>\n<li aria-level=\"1\">openssh_8.2 59887<\/li>\n<li aria-level=\"1\">openssh_7.9 59301<\/li>\n<li aria-level=\"1\">dropbear&nbsp; &nbsp; 51374<\/li>\n<li aria-level=\"1\">openssh 35408<\/li>\n<li aria-level=\"1\">openssh_7.2 34494<\/li>\n<li aria-level=\"1\">openssh_7.8 33955<\/li>\n<li aria-level=\"1\">dropbear_2020.81&nbsp; &nbsp; 28189<\/li>\n<li aria-level=\"1\">openssh_9.5 27525<\/li>\n<li aria-level=\"1\">openssh_9.1 26748<\/li>\n<li aria-level=\"1\">openssh_8.1 23188<\/li>\n<li aria-level=\"1\">lancom&nbsp; 22267<\/li>\n<li aria-level=\"1\">openssh_6.4 18483<\/li>\n<li aria-level=\"1\">openssh_8.4 18158<\/li>\n<li aria-level=\"1\">openssh_8.9 17310<\/li>\n<li aria-level=\"1\">openssh_7.6 17235<\/li>\n<li aria-level=\"1\">openssh_for_windows_8.1 17150<\/li>\n<li aria-level=\"1\">openssh_for_windows_7.7 15603<\/li>\n<li aria-level=\"1\">openssh_8.6 14018<\/li>\n<li aria-level=\"1\">openssh_6.9 13601<\/li>\n<li aria-level=\"1\">openssh_9.4 12802<\/li>\n<li aria-level=\"1\">dropbear_2022.82&nbsp; &nbsp; 12605<\/li>\n<li aria-level=\"1\">dropbear_2022.83&nbsp; &nbsp; 12036<\/li>\n<li aria-level=\"1\">openssh_7.7 11645<\/li>\n<li aria-level=\"1\">openssh_for_windows_8.0 11089<\/li>\n<li aria-level=\"1\">openssh_7.3 10083<\/li>\n<li aria-level=\"1\">mod_sftp&nbsp; &nbsp; 9937<\/li>\n<li aria-level=\"1\">openssh_8.3p1 &nbsp; 9163<\/li>\n<li aria-level=\"1\">cisco-1.25&nbsp; 8301<\/li>\n<\/ul>\n<p>Patching Terrapin isn\u2019t straightforward, because of the sheer number of implementations affected and the necessity that apps running on both the admin client and the server be patched. The researchers listed the following implementations as vulnerable and included links to patches when available. Asterisks indicate application developers contacted prior to the release of the research paper:<\/p>\n<table>\n<thead>\n<tr>\n<th>Implementation<\/th>\n<th>Affected Versions<\/th>\n<th>Patched Version(s)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr id=\"asyncssh\">\n<td>AsyncSSH*<\/td>\n<td>2.14.1 and earlier<\/td>\n<td><a href=\"https:\/\/asyncssh.readthedocs.io\/en\/latest\/changes.html#release-2-14-2-18-dec-2023\">2.14.2<\/a><\/td>\n<\/tr>\n<tr id=\"bitvise\">\n<td>Bitvise SSH*<\/td>\n<td>9.31 and earlier<\/td>\n<td><a href=\"https:\/\/www.bitvise.com\/ssh-client-version-history#933\">9.33<\/a><\/td>\n<\/tr>\n<tr id=\"connectbot\">\n<td>ConnectBot*<\/td>\n<td>1.9.9 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/connectbot\/connectbot\/releases\/tag\/v1.9.10\">1.9.10<\/a><\/td>\n<\/tr>\n<tr id=\"crushftp\">\n<td>CrushFTP<\/td>\n<td>10.5.6 and earlier<\/td>\n<td><a href=\"https:\/\/www.crushftp.com\/crush10wiki\/Wiki.jsp?page=Update\">10.6.0<\/a><\/td>\n<\/tr>\n<tr id=\"cyclonessh\">\n<td>CycloneSSH*<\/td>\n<td>2.3.2 and earlier<\/td>\n<td><a href=\"https:\/\/oryx-embedded.com\/download\/#changelog\">2.3.4<\/a><\/td>\n<\/tr>\n<tr id=\"dropbear\">\n<td>Dropbear*<\/td>\n<td>2022.83 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/mkj\/dropbear\/commit\/6e43be5c7b99dbee49dc72b6f989f29fdd7e9356\">To be released<\/a><\/td>\n<\/tr>\n<tr id=\"erlang\">\n<td>Erlang\/OTP SSH*<\/td>\n<td>OTP 26.2 and earlier<br \/>OTP 25.3.2.7 and earlier<br \/>OTP 24.3.4.14 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/erlang\/otp\/releases\/tag\/OTP-26.2.1\">OTP 26.2.1<\/a><br \/><a href=\"https:\/\/github.com\/erlang\/otp\/releases\/tag\/OTP-25.3.2.8\">OTP 25.3.2.8<\/a><br \/><a href=\"https:\/\/github.com\/erlang\/otp\/releases\/tag\/OTP-24.3.4.15\">OTP 24.3.4.15<\/a><\/td>\n<\/tr>\n<tr id=\"filezilla\">\n<td>FileZilla Client<\/td>\n<td>3.66.1 and earlier<\/td>\n<td><a href=\"https:\/\/filezilla-project.org\/versions.php\">3.66.4<\/a><\/td>\n<\/tr>\n<tr id=\"golang\">\n<td>Golang x\/crypto\/ssh*<\/td>\n<td>0.16.0 and earlier<\/td>\n<td><a href=\"https:\/\/groups.google.com\/g\/golang-announce\/c\/qA3XtxvMUyg\">0.17.0<\/a><\/td>\n<\/tr>\n<tr id=\"jsch\">\n<td>JSch (Fork)*<\/td>\n<td>0.2.14 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/mwiede\/jsch\/releases\/tag\/jsch-0.2.15\">0.2.15<\/a><\/td>\n<\/tr>\n<tr id=\"libssh\">\n<td>libssh*<\/td>\n<td>0.10.5 and earlier<br \/>0.9.7 and earlier<\/td>\n<td><a href=\"https:\/\/www.libssh.org\/2023\/12\/18\/libssh-0-10-6-and-libssh-0-9-8-security-releases\/\">0.10.6<br \/>0.9.8<\/a><\/td>\n<\/tr>\n<tr id=\"libssh2\">\n<td>libssh2*<\/td>\n<td>1.11.0 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/libssh2\/libssh2\/commit\/d34d9258b8420b19ec3f97b4cc5bf7aa7d98e35a\">To be released<\/a><\/td>\n<\/tr>\n<tr id=\"maverickslegacy\">\n<td>Maverick Legacy*<\/td>\n<td>1.7.55 and earlier<\/td>\n<td><a href=\"https:\/\/jadaptive.com\/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795\/\">1.7.56<\/a><\/td>\n<\/tr>\n<tr id=\"mavericksynergy\">\n<td>Maverick Synergy*<\/td>\n<td>3.0.21 and earlier (Hotfix)<br \/>3.0.10 and earlier (OSS)<\/td>\n<td><a href=\"https:\/\/jadaptive.com\/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795\/\">3.0.22<br \/>3.1.0-SNAPSHOT<\/a><\/td>\n<\/tr>\n<tr id=\"mobaxterm\">\n<td>MobaXterm<\/td>\n<td>23.5 and earlier<\/td>\n<td><a href=\"https:\/\/mobaxterm.mobatek.net\/download-home-edition.html\">23.6<\/a><\/td>\n<\/tr>\n<tr id=\"nova\">\n<td>Nova<\/td>\n<td>11.7 and earlier<\/td>\n<td><a href=\"https:\/\/nova.app\/releases\/#v11.8\">11.8<\/a><\/td>\n<\/tr>\n<tr id=\"openssh\">\n<td>OpenSSH*<\/td>\n<td>9.5 \/ 9.5p1 and earlier<\/td>\n<td><a href=\"https:\/\/www.openssh.com\/txt\/release-9.6\">9.6 \/ 9.6p1<\/a><\/td>\n<\/tr>\n<tr id=\"paramiko\">\n<td>Paramiko*<\/td>\n<td>3.3.1 and earlier<\/td>\n<td><a href=\"https:\/\/www.paramiko.org\/changelog.html#3.4.0\">3.4.0<\/a><\/td>\n<\/tr>\n<tr id=\"phpseclib\">\n<td>phpseclib<\/td>\n<td>3.0.34 and earlier<br \/>2.0.45 and earlier<br \/>1.0.21 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/phpseclib\/phpseclib\/releases\/tag\/3.0.35\">3.0.35<\/a><br \/><a href=\"https:\/\/github.com\/phpseclib\/phpseclib\/releases\/tag\/2.0.46\">2.0.46<\/a><br \/><a href=\"https:\/\/github.com\/phpseclib\/phpseclib\/releases\/tag\/1.0.22\">1.0.22<\/a><\/td>\n<\/tr>\n<tr id=\"pkixssh\">\n<td>PKIX-SSH*<\/td>\n<td>14.3 and earlier<\/td>\n<td><a href=\"https:\/\/roumenpetrov.info\/secsh\/#news20231220\">14.4<\/a><\/td>\n<\/tr>\n<tr id=\"proftpd\">\n<td>ProFTPD*<\/td>\n<td>1.3.8a and earlier<\/td>\n<td><a href=\"http:\/\/www.proftpd.org\/docs\/RELEASE_NOTES-1.3.8b\">1.3.8b<\/a><\/td>\n<\/tr>\n<tr id=\"putty\">\n<td>PuTTY*<\/td>\n<td>0.79 and earlier<\/td>\n<td><a href=\"https:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/changes.html\">0.80<\/a><\/td>\n<\/tr>\n<tr id=\"russh\">\n<td>Russh*<\/td>\n<td>0.40.1 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/warp-tech\/russh\/releases\/tag\/v0.40.2\">0.40.2<\/a><\/td>\n<\/tr>\n<tr id=\"securecrt\">\n<td>SecureCRT*<\/td>\n<td>9.4.2 and earlier<\/td>\n<td><a href=\"https:\/\/www.vandyke.com\/products\/securecrt\/history.txt\">9.4.3<\/a><\/td>\n<\/tr>\n<tr id=\"sftpgateway\">\n<td>SFTP Gateway<\/td>\n<td>3.4.5 and earlier<\/td>\n<td><a href=\"https:\/\/help.thorntech.com\/docs\/sftp-gateway-3.0\/aws-cve-2023-48795\/\">3.4.6<\/a><\/td>\n<\/tr>\n<tr id=\"sftpgo\">\n<td>SFTPGo<\/td>\n<td>2.5.5 and earlier<br \/>2.4.5 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/drakkan\/sftpgo\/releases\/tag\/v2.5.6\">2.5.6<\/a><br \/><a href=\"https:\/\/github.com\/drakkan\/sftpgo\/releases\/tag\/v2.4.6\">2.4.6<\/a><\/td>\n<\/tr>\n<tr id=\"ssh2\">\n<td>ssh2*<\/td>\n<td>1.14.0 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/mscdex\/ssh2\/releases\/tag\/v1.15.0\">1.15.0<\/a><\/td>\n<\/tr>\n<tr id=\"sshj\">\n<td>sshj*<\/td>\n<td>0.37.0 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/hierynomus\/sshj\/releases\/tag\/v0.38.0\">0.38.0<\/a><\/td>\n<\/tr>\n<tr id=\"teraterm\">\n<td>Tera Term*<\/td>\n<td>5.0 and earlier<br \/>4.107 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/TeraTermProject\/teraterm\/releases\/tag\/v5.1\">5.1<\/a><br \/><a href=\"https:\/\/github.com\/TeraTermProject\/teraterm\/releases\/tag\/v4.108\">4.108<\/a><\/td>\n<\/tr>\n<tr id=\"thrussh\">\n<td>Thrussh*<\/td>\n<td>0.34.0 and earlier<\/td>\n<td><a href=\"https:\/\/crates.io\/crates\/thrussh\/0.35.1\">0.35.1<\/a><\/td>\n<\/tr>\n<tr id=\"tinyssh\">\n<td>TinySSH<\/td>\n<td>20230101 and earlier<\/td>\n<td><a href=\"https:\/\/github.com\/janmojzis\/tinyssh\/releases\/tag\/20240101\">20240101<\/a><\/td>\n<\/tr>\n<tr id=\"transmit\">\n<td>Transmit<\/td>\n<td>5.10.3 and earlier<\/td>\n<td><a href=\"https:\/\/help.panic.com\/releasenotes\/transmit5\/\">5.10.4<\/a><\/td>\n<\/tr>\n<tr id=\"win32openssh\">\n<td>Win32-OpenSSH*<\/td>\n<td>9.4.0.0p1-Beta<\/td>\n<td><a href=\"https:\/\/github.com\/PowerShell\/Win32-OpenSSH\/releases\/tag\/v9.5.0.0p1-Beta\">9.5.0.0p1-Beta<\/a><\/td>\n<\/tr>\n<tr id=\"winscp\">\n<td>WinSCP<\/td>\n<td>6.1.2 and earlier<\/td>\n<td><a href=\"https:\/\/winscp.net\/eng\/docs\/history#6.2.2\">6.2.2 beta<\/a><\/td>\n<\/tr>\n<tr id=\"xshell7\">\n<td>XShell 7*<\/td>\n<td>Build 0142 and earlier<\/td>\n<td><a href=\"https:\/\/www.netsarang.com\/en\/xshell-update-history\/\">Build 0144<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>As explained earlier, there\u2019s little reason for mass alarm. Terrapin is no <a href=\"https:\/\/arstechnica.com\/security\/2023\/10\/critical-citrix-bleed-vulnerability-allowing-mfa-bypass-comes-under-mass-exploitation\/\">Citrix Bleed <\/a>, <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/02\/unpatched-vulnerabilities-in-fortinet-and-zoho-products-come-under-mass-attack\/\"> CVE-2022-47966<\/a>, <a href=\"https:\/\/arstechnica.com\/security\/2023\/07\/moveit-app-mass-exploited-last-month-patches-new-critical-vulnerability\/\">MoveIT<\/a>, <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/02\/unpatched-vulnerabilities-in-fortinet-and-zoho-products-come-under-mass-attack\/\">CVE-2021-22986<\/a>, or <a href=\"https:\/\/arstechnica.com\/security\/2023\/11\/owncloud-vulnerability-with-a-maximum-10-severity-rating-comes-under-mass-exploitation\/\">CVE-2023-49103<\/a>, or <a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/03\/to-security-pros-dread-another-critical-server-vulnerability-is-under-exploit\/\">CVE-2021-22986<\/a>, which were some of the most exploited vulnerabilities of 2023 that led to the compromise of millions of servers. So far, there are no known reports of Terrapin patches causing side effects. Admins would do well to patch sooner rather than later. READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35361\/Millions-Still-Havent-Patched-Terrapin-SSH-Protocol-Vulnerability.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54987,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[6234],"class_list":["post-54986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyflawpatchcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Millions Still Haven&#039;t Patched Terrapin SSH Protocol Vulnerability 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Millions Still Haven&#039;t Patched Terrapin SSH Protocol Vulnerability 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-04T13:17:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/server-admin-800x534.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Millions Still Haven&#8217;t Patched Terrapin SSH Protocol Vulnerability\",\"datePublished\":\"2024-01-04T13:17:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/\"},\"wordCount\":1044,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability.jpg\",\"keywords\":[\"headline,privacy,flaw,patch,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/\",\"name\":\"Millions Still Haven't Patched Terrapin SSH Protocol Vulnerability 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability.jpg\",\"datePublished\":\"2024-01-04T13:17:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability.jpg\",\"width\":800,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,flaw,patch,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyflawpatchcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Millions Still Haven&#8217;t Patched Terrapin SSH Protocol Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Millions Still Haven't Patched Terrapin SSH Protocol Vulnerability 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Millions Still Haven't Patched Terrapin SSH Protocol Vulnerability 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-04T13:17:12+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/server-admin-800x534.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Millions Still Haven&#8217;t Patched Terrapin SSH Protocol Vulnerability","datePublished":"2024-01-04T13:17:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/"},"wordCount":1044,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability.jpg","keywords":["headline,privacy,flaw,patch,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/","url":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/","name":"Millions Still Haven't Patched Terrapin SSH Protocol Vulnerability 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability.jpg","datePublished":"2024-01-04T13:17:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability.jpg","width":800,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/millions-still-havent-patched-terrapin-ssh-protocol-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,flaw,patch,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyflawpatchcryptography\/"},{"@type":"ListItem","position":3,"name":"Millions Still Haven&#8217;t Patched Terrapin SSH Protocol Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54986"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54986\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54987"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}