regreSSHion - Code Execution Vulnerability(1)

PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability

Share:

A proof-of-concept (PoC) exploit for the critical OpenSSH vulnerability CVE-2024-6387, also known as “regreSSHion,” has been released, raising alarms across the cybersecurity community.

The flaw, which affects millions of OpenSSH servers globally, allows unauthenticated, remote attackers to execute arbitrary code with root privileges under specific conditions.

The Vulnerability: A Regression Of A 2006 Issue

CVE-2024-6387 arises from a signal handler race condition in OpenSSH’s server (sshd). This issue occurs when an unauthenticated client fails to log in within the `LoginGraceTime` limit (120 seconds by default).

The server’s SIGALRM handler, triggered in this scenario, calls non-async-signal-safe functions such as `syslog()`, creating a race condition that can be exploited to achieve remote code execution (RCE).

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

This vulnerability is particularly critical because it reintroduces a flaw first patched in 2006 (CVE-2006-5051), making it a regression issue. The vulnerability was uncovered by Qualys Threat Research Unit.

It impacts OpenSSH versions 8.5p1 through 9.8p1 on glibc-based Linux systems. OpenBSD systems remain unaffected due to their different signal-handling mechanisms.

Exploitation Challenges And Risks

While the vulnerability is severe, exploiting it is not straightforward. Security researchers have described it as a “statistical exploit,” requiring numerous attempts to win the race condition.

In controlled environments, successful exploitation takes between several hours and one week, depending on system configurations and mitigations like Address Space Layout Randomization (ASLR). Despite these challenges, the release of PoC code significantly lowers the barrier for attackers.

Reports indicate that exploit tools targeting CVE-2024-6387 are already circulating on underground forums, and at least one IP address has been observed attempting exploitation in the wild.

The vulnerability affects over 14 million internet-exposed OpenSSH servers globally, according to scans conducted using tools like Shodan and Censys.

Approximately 700,000 of these are confirmed vulnerable based on Qualys’ data. Exploitation could lead to full system compromise, allowing attackers to install malware, create backdoors, manipulate data, and propagate within networks.

Notably, exploitation has only been demonstrated on 32-bit Linux systems with glibc. While exploitation on 64-bit systems or non-glibc environments is theoretically possible, it has not been confirmed.

Mitigation Measures

To address this critical vulnerability:

  • Upgrade to OpenSSH 9.8 or Later: The latest version includes patches that resolve the race condition.
  • Temporary Workaround: Set `LoginGraceTime` to `0` in the sshd configuration file. While this prevents exploitation of the vulnerability, it may expose systems to denial-of-service risks.
  • Restrict Access: Use network-based controls to limit SSH access.
  • Monitor for Indicators of Compromise (IoCs): Organizations should deploy intrusion detection systems and monitor logs for unusual activity.

The release of the PoC code has sparked widespread concern among cybersecurity experts. While some researchers have struggled to achieve successful exploitation outside laboratory settings, others warn that attackers could refine these methods over time.

Organizations are urged to act swiftly to patch affected systems and implement additional security measures where immediate upgrades are not feasible.

The release of a PoC exploit for CVE-2024-6387 underscores the urgency of addressing this critical vulnerability in OpenSSH servers.

While mass exploitation remains unlikely due to technical barriers, the potential impact of successful attacks is severe. Organizations must prioritize patching and adopt layered security measures to mitigate risks associated with this flaw.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:01 pm, Apr 19, 2025
weather icon 16°C
L: 15° | H: 17°
overcast clouds
Humidity: 51 %
Pressure: 1008 mb
Wind: 12 mph ESE
Wind Gust: 23 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:55 am
Sunset: 8:02 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
15° | 17°°C 0 mm 0% 14 mph 63 % 1008 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
6° | 12°°C 0 mm 0% 9 mph 80 % 1008 mb 0 mm/h
Mon Apr 21 10:00 pm
weather icon
8° | 14°°C 0.82 mm 82% 6 mph 87 % 1014 mb 0 mm/h
Tue Apr 22 10:00 pm
weather icon
8° | 16°°C 0 mm 0% 7 mph 93 % 1019 mb 0 mm/h
Wed Apr 23 10:00 pm
weather icon
8° | 13°°C 1 mm 100% 11 mph 95 % 1018 mb 0 mm/h
Today 4:00 pm
weather icon
14° | 16°°C 0 mm 0% 14 mph 50 % 1008 mb 0 mm/h
Today 7:00 pm
weather icon
13° | 14°°C 0 mm 0% 12 mph 55 % 1008 mb 0 mm/h
Today 10:00 pm
weather icon
8° | 8°°C 0 mm 0% 10 mph 63 % 1008 mb 0 mm/h
Tomorrow 1:00 am
weather icon
8° | 8°°C 0 mm 0% 9 mph 73 % 1008 mb 0 mm/h
Tomorrow 4:00 am
weather icon
6° | 6°°C 0 mm 0% 8 mph 79 % 1008 mb 0 mm/h
Tomorrow 7:00 am
weather icon
6° | 6°°C 0 mm 0% 8 mph 79 % 1008 mb 0 mm/h
Tomorrow 10:00 am
weather icon
11° | 11°°C 0 mm 0% 9 mph 59 % 1007 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
11° | 11°°C 0 mm 0% 9 mph 69 % 1007 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€74,986.74
0.75%
Ethereum(ETH)
€1,404.12
0.21%
Tether(USDT)
€0.88
0.01%
XRP(XRP)
€1.83
-0.06%
Solana(SOL)
€121.99
2.82%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.138862
1.17%
Shiba Inu(SHIB)
€0.000011
0.91%
Pepe(PEPE)
€0.000006
0.45%
Scroll to Top