Yep, you've got a script kiddie there. But how did they get in? Did youhave ssh enabled with password authentication?
Well, that is very likely how they gained entry. In which case there is no software vulnerability for us to fix. Just a wetware vulnerability
I have since disabled remote access.