It happened also to me on other major cloud vendors instances (Amz Linux...).
Scanner flagged it but it was fully patched due to version unchanged.
The problem is that many scanners are "generic", they try to apply the best heuristics given the surface available, and this translate in many instances that they just parse version protocol headers.
So, one have to check if it is a false positive or not.
And usually in my experience they produce a lot of false positives due to the heterogeneity of the task and OSes.
Still the vendor did their patch, so it is a grey area.
I concur though that bumping the version would make life easier to the security team from the start.
------------------------------
--ft
------------------------------
Original Message:
Sent: Tue April 16, 2024 09:38 AM
From: Robert Berendt
Subject: CVE-2023-51385 issue
Please vote on my idea
https://ibm-power-systems.ideas.ibm.com/ideas/IBMI-I-4051
Upgrade level of OpenSSH from v8.6p1 to one which will pass scanning services.
We are getting dinged by Qualys that our IBM i is exposed to CVE-2023-51385.
------------------------------
Robert Berendt IBMChampion
------------------------------