Vulnslist

find the latest Cisco vulnerabilities

Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (regreSSHion): July 2024

cisco-sa-openssh-rce-2024 · High · Published · Updated

On July 1, 2024, the Qualys Threat Research Unit (TRU) disclosed an unauthenticated, remote code execution vulnerability that affects the OpenSSH server (sshd) in glibc-based Linux systems. CVE-2024-6387: A signal handler race condition was found in sshd, where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then the sshd SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). For a description of this vulnerability, see the Qualys Security Advisory. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssh-rce-2024

Workarounds

Any workarounds will be documented in the product-specific Cisco bugs, which are identified in the Vulnerable Products ["#vp"] section of this advisory.

CVEsCVE-2024-6387
Cisco Bug IDsNA
CVSS ScoreBase 8.1
Base 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Catalyst SD-WAN, Cisco Catalyst SD-WAN Manager, Cisco Catalyst SD-WAN Controller

Related Products

Product CVE Evidence
Cisco SD-WAN CVE-2024-6387 Cisco OpenVuln
Cisco RV Series Routers CVE-2024-6387 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2024-6387 Cisco OpenVuln
Cisco Meraki MS Series Switches CVE-2024-6387 Cisco OpenVuln
Cisco Catalyst SD-WAN Software CVE-2024-6387 Cisco OpenVuln
Cisco Catalyst SD-WAN Manager CVE-2024-6387 Cisco OpenVuln
Cisco Catalyst SD-WAN Controller CVE-2024-6387 Cisco OpenVuln
Cisco Catalyst SD-WAN CVE-2024-6387 Cisco OpenVuln