CVE-2024-6387
“The new vulnerability, assigned CVE-2024-6387, allows for unauthenticated remote code execution (RCE) with root privileges, posing a severe threat to affected systems.
An attacker could potentially gain complete control of the affected system, executing arbitrary code with root privileges. This could allow the installation of malware, the creation of backdoors and the exfiltration or manipulation of data. In addition, gaining root privileges could allow the intruder to disable or bypass critical security systems in order to maintain a permanent presence.”
“Customers are advised to upgrade to OpenSSH 9.8 or later to remediate this vulnerability.”
'Critical' vulnerability in OpenSSH uncovered, affects almost all Linux systems
Researchers at the Qualys Threat Research Unit (TRU) have unearthed discovered a critical security flaw in OpenSSH's server (sshd) in glibc-based Linux systems.
www.computing.co.uk
CVE-2024-6387: How to fix the regreSSHion vulnerability
CVE-2024-6387, or regreSSHion, allows remote unauthenticated attackers to execute code on OpenSSH servers. Here's what you need to know.
vulcan.io
“The new vulnerability, assigned CVE-2024-6387, allows for unauthenticated remote code execution (RCE) with root privileges, posing a severe threat to affected systems.
An attacker could potentially gain complete control of the affected system, executing arbitrary code with root privileges. This could allow the installation of malware, the creation of backdoors and the exfiltration or manipulation of data. In addition, gaining root privileges could allow the intruder to disable or bypass critical security systems in order to maintain a permanent presence.”
“Customers are advised to upgrade to OpenSSH 9.8 or later to remediate this vulnerability.”