• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new openssh vulnerability could lead to rce as root on

New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems

You are here: Home / General Cyber Security News / New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems
July 1, 2024

OpenSSH maintainers have launched security updates to comprise a critical security flaw that could outcome in unauthenticated remote code execution with root privileges in glibc-based Linux units.

The vulnerability has been assigned the CVE identifier CVE-2024-6387. It resides in the OpenSSH server part, also recognised as sshd, which is created to listen for connections from any of the customer purposes.

“The vulnerability, which is a signal handler race issue in OpenSSH’s server (sshd), makes it possible for unauthenticated distant code execution (RCE) as root on glibc-centered Linux units,” Bharat Jogi, senior director of the risk research unit at Qualys, claimed in a disclosure posted these days. “This race affliction has an effect on sshd in its default configuration.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The cybersecurity company claimed it recognized no a lot less than 14 million perhaps vulnerable OpenSSH server instances uncovered to the internet, including it is really a regression of an by now patched 18-12 months-old flaw tracked as CVE-2006-5051, with the difficulty reinstated in Oct 2020 as component of OpenSSH variation 8.5p1.

“Successful exploitation has been demonstrated on 32-little bit Linux/glibc methods with [address space layout randomization],” OpenSSH said in an advisory. “Less than lab conditions, the attack involves on common 6-8 several hours of continuous connections up to the maximum the server will settle for.”

The vulnerability impacts versions amongst 8.5p1 and 9.7p1. Variations prior 4.4p1 are also susceptible to the race affliction bug unless of course they are patched for CVE-2006-5051 and CVE-2008-4109. It’s worthy of noting that OpenBSD methods are unaffected as they consist of a security system that blocks the flaw.

Particularly, Qualys uncovered that if a customer does not authenticate in just 120 seconds (a location defined by LoginGraceTime), then sshd’s SIGALRM handler is known as asynchronously in a fashion that is not async-signal-harmless.

Cybersecurity

The net outcome of exploiting CVE-2024-6387 is whole program compromise and takeover, enabling menace actors to execute arbitrary code with the highest privileges, subvert security mechanisms, knowledge theft, and even manage persistent entry.

“A flaw, at the time fastened, has reappeared in a subsequent computer software release, typically because of to changes or updates that inadvertently reintroduce the issue,” Jogi stated. “This incident highlights the vital function of complete regression tests to avert the reintroduction of acknowledged vulnerabilities into the surroundings.”

When the vulnerability has significant roadblocks due to its distant race problem character, customers are advised to apply the newest patches to safe versus likely threats. It can be also encouraged to restrict SSH accessibility by way of network-centered controls and enforce network segmentation to limit unauthorized entry and lateral movement.

Located this write-up fascinating? Abide by us on Twitter  and LinkedIn to go through extra distinctive articles we publish.


Some components of this short article are sourced from:
thehackernews.com

Previous Post: «juniper networks releases critical security update for routers Juniper Networks Releases Critical Security Update for Routers
Next Post: End-to-End Secrets Security: Making a Plan to Secure Your Machine Identities end to end secrets security: making a plan to secure your machine»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.