CVE-2024-6387Exploit Available
OpenSSH RegreSSHion Race Condition RCE
🏭 OpenBSD FoundationCWE-362#SSH#Linux#RCE#Race Condition#Unauthenticated
8.1Critical
010.0
Vulnerability Description
A critical race condition in OpenSSH's signal handler (dubbed "regreSSHion") allows unauthenticated remote code execution as root on Linux systems. The vulnerability reintroduces CVE-2006-5051 and affects a large portion of internet-facing SSH servers.
Recommended Mitigation
Upgrade OpenSSH to 9.8p1. As a temporary mitigation, set LoginGraceTime=0 in sshd_config (note: this may increase DoS risk). Restrict SSH access via firewall rules.
Affected Products
OpenSSH
Ubuntu
Debian
Fedora
Amazon Linux
Alpine Linux
Version constraint: OpenSSH 8.5p1 - 9.8p1 (excluding 9.8p1)
Quick Facts
- Published
- 2024-07-01
- Last Modified
- 2024-07-05
- Vendor
- OpenBSD Foundation
- CWE
- CWE-362
- Exploit
- ⚠️ Public Exploit Exists
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H