Threat Brief: CVE-2024-6387 OpenSSH RegreSSHion Vulnerability

  • Thursday, 4th July, 2024
  • 03:09am

On July 1, 2024, a critical signal handler race condition vulnerability was disclosed in OpenSSH servers (sshd) on glibc-based Linux systems. This vulnerability, called RegreSSHion and tracked as CVE-2024-6387, can result in unauthenticated remote code execution (RCE) with root privileges. This vulnerability has been rated High severity (CVSS 8.1).

For systems that are operated directly by you, it is crucial that you also take the necessary measures to protect these systems. In a matter of urgency, we would like to inform you, that you have to do the following steps:

1. Identify affected systems: check which of your systems are potentially affected by CVE-2024-6387.

2. Apply the necessary patches: Ensure that all affected systems are patched with the appropriate security updates.

This vulnerability impacts the following OpenSSH server versions:

  • Open SSH version between 8.5p1-9.8p1
  • Open SSH versions earlier than 4.4p1, if they’ve not backport-patched against CVE-2006-5051 or patched against CVE-2008-4109
« Back