CVE-2024-6387: Critical OpenSSH Unauthenticated RCE Flaw ‘regreSSHion’ Exposes Millions of Linux Systems
The Qualys Threat Research Unit (TRU) has detailed a severe security flaw, dubbed ‘regreSSHion,’ that leaves millions of Linux systems vulnerable to remote code execution. The vulnerability, identified as CVE-2024-6387, affects OpenSSH’s server (sshd) on glibc-based Linux systems, allowing unauthenticated attackers to gain root access and potentially seize complete control of the affected machines.
The vulnerability, a signal handler race condition in OpenSSH’s server (sshd), impacts sshd in its default configuration and “does not require user interaction”. This race condition is particularly concerning as it allows unauthenticated RCE as root, giving attackers full control over the affected systems. This flaw is present in OpenSSH versions from 8.5p1 up to, but not including, 9.8p1, reintroducing a previously patched issue from CVE-2006-5051.
“This bug marks the first OpenSSH vulnerability in nearly two decades—an unauthenticated RCE that grants full root access. It affects the default configuration and does not require user interaction, posing a significant exploit risk,” researcher noted.
The scope of the vulnerability is vast, with over 14 million potentially vulnerable OpenSSH server instances identified through Censys and Shodan searches. Qualys’ own data reveals that approximately 700,000 of these are exposed to the internet, accounting for a significant portion of their global customer base.
Successful exploitation of regreSSHion could have devastating consequences. Attackers could gain full system compromise, installing malware, manipulating data, and establishing backdoors for persistent access. The ability to propagate through networks and bypass security mechanisms makes this vulnerability particularly dangerous for enterprises and individuals alike.
While the vulnerability is challenging to exploit due to its remote race condition nature, requiring multiple attempts for a successful attack, advancements in deep learning could significantly increase exploitation rates. These technologies may provide attackers with sophisticated methods to leverage such security flaws, making timely mitigation crucial.
To address the regreSSHion vulnerability, enterprises should adopt a focused and layered security approach:
- Patch Management: Promptly apply available patches for OpenSSH and prioritize regular update processes to ensure all systems are protected.
- Enhanced Access Control: Limit SSH access through network-based controls to minimize attack risks.
- Network Segmentation and Intrusion Detection: Implement network segmentation to restrict unauthorized access and lateral movements within critical environments. Deploy intrusion detection systems to monitor and alert on unusual activities indicative of exploitation attempts.
For detailed technical information on CVE-2024-6387, refer to the official documentation provided by Qualys here.