Critical OpenSSH Flaw "RegreSSHion" Threatens 14M Linux Systems: Patch Now to Prevent Remote Code Execution
July 2, 2024Qualys TRU researchers discovered a critical flaw in the OpenSSH server, dubbed 'RegreSSHion,' affecting glibc-based Linux systems.
The vulnerability, identified as CVE-2024-6387, allows for remote unauthenticated code execution on systems running OpenSSH versions 8.5p1 to 9.7p1 and versions prior to 4.4p1.
This flaw arises from a signal handler race condition and impacts over 14 million Linux systems worldwide.
No active exploits have been observed yet, but security teams are urged to patch vulnerable systems promptly.
OpenBSD systems are not affected by this vulnerability.
Mitigation steps include updating to OpenSSH version 9.8 or adjusting the LoginGraceTime parameter in the configuration file.
OX Security customers can verify and patch vulnerable OpenSSH libraries.
Continuous monitoring for critical CVEs and implementing network access controls for SSH are recommended.
Admins should proactively secure their OpenSSH servers to prevent exploitation and data breaches.
Summary based on 16 sources
Get a daily email with more Tech stories
Sources
Dark Reading • Jul 1, 2024
'RegreSSHion' Bug Threatens Takeover of Millions of Linux SystemsCSO Online • Jul 1, 2024
OpenSSH vulnerability regreSSHion puts millions of servers at riskBleepingComputer • Jul 1, 2024
New regreSSHion OpenSSH RCE bug gives root on Linux serversThe Register • Jul 1, 2024
Nasty regreSSHion bug in OpenSSH puts around 700K Linux boxes at risk