The only issues here are with the reporting tool, and with the response to the report.
macOS sshd is not effected, per what Qualys themselves have posted.
More generally: Please don’t immediately apply the remediation suggested by add-on anti-malware. Not without giving the detection and the remediation some consideration. Consideration whether the add-on anti-malware is correct, and consider whether the detection even matters, or if things are mis-detecting or are just busted. Busted? More than a little add-on anti-malware has (erroneously) suggested doing bad things to macOS.
Want details about this case? Ask Qualys support.
Given the following information from Qualys does not apply to your configuration, you will want to report the errant Qualys detection bug, or the errant suggestion or confusing Qualys documentation or whatever kicked over this quest, to Qualys support:
The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this vulnerability is CVE-2024-6387.
1: This isn’t Linux, and 2: macOS uses libc and not glibc.
How to back out the sshd changes might unfortunately be a project. If there are backups from prior to those changes, I might consider restoring those. Otherwise, homebrew can hopefully remove what it added.
If you want to learn about this Linux sshd bug involving glibc, here is the Qualys report:
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server