CVE-2024-6387 – Shields Up Against RegreSSHion
Blog post from Sysdig
CVE-2024-6387, dubbed "regreSSHion," is a critical vulnerability in the OpenSSH server caused by an accidental code removal that had previously mitigated an earlier vulnerability, CVE-2006-5051. This flaw affects OpenSSH versions older than 4.4p1 and those between 8.5p1 and 9.8p1, potentially allowing unauthenticated attackers to gain root-level access and execute arbitrary code on glibc-based Linux systems. Despite its complexity, which involves multiple connection attempts over several hours, the vulnerability poses significant risks, including system compromise and data theft. OpenSSH on OpenBSD is notably not affected due to its use of a safer logging function. Qualys's security team estimates that around 14 million OpenSSH server instances are at risk, urging users to update their systems and limit SSH access. Tools like Sysdig Secure can help identify vulnerable packages and monitor for suspicious activities, employing real-time behavioral insights and threat intelligence to enhance security across cloud environments.