CVE-2024-6387Exploit Available

OpenSSH RegreSSHion Race Condition RCE

🏭 OpenBSD FoundationCWE-362#SSH#Linux#RCE#Race Condition#Unauthenticated
8.1Critical
010.0

Vulnerability Description

A critical race condition in OpenSSH's signal handler (dubbed "regreSSHion") allows unauthenticated remote code execution as root on Linux systems. The vulnerability reintroduces CVE-2006-5051 and affects a large portion of internet-facing SSH servers.

Recommended Mitigation

Upgrade OpenSSH to 9.8p1. As a temporary mitigation, set LoginGraceTime=0 in sshd_config (note: this may increase DoS risk). Restrict SSH access via firewall rules.

Affected Products

OpenSSH
Ubuntu
Debian
Fedora
Amazon Linux
Alpine Linux

Version constraint: OpenSSH 8.5p1 - 9.8p1 (excluding 9.8p1)

Quick Facts

Published
2024-07-01
Last Modified
2024-07-05
Vendor
OpenBSD Foundation
CWE
CWE-362
Exploit
⚠️ Public Exploit Exists

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H