Software
Service
Insights
Case & Story
Dev Platform
Sign In
Public Notices
OpenSSH Remote Code Execution Vulnerability (CVE-2024-6387)
July 4, 2024 GMT+08:00
1.Overview

OpenSSH is the premier connectivity tool for remote login with the SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks.

Recently, OpenSSH has issued an advisory regarding a remote code execution vulnerability (CVE-2024-6387). It arises from a race condition in signal handler processing, which could potentially allow an unauthenticated remote attacker to execute code with root privileges on the affected Linux system. Vulnerability details and PoC have been disclosed, and the risk is high. If you are a Linux kernel user, check your system and implement timely security hardening.

Reference:

https://www.openssh.com/security.html

https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server

2.Severity

Severity: important

(Severity: low, moderate, important, and critical)

3.Affected Products

Affected versions:

8.5p1 <= OpenSSH < 9.8p1

Secure versions:

OpenSSH >= 9.8p1

4.Vulnerability Handling

This vulnerability has been fixed in later official versions. If your service version falls into the affected range, upgrade it to a latest secure version.

https://www.openssh.com/releasenotes.html

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.

5.Technical Support

Get more professional support at any time

Contact Us

Email: GlobalTechnicalService@iwhalecloud.com
Contact Us