July 2nd, 2024

Remote Unauthenticated Code Execution in OpenSSH Server

Qualys found regreSSHion, a critical RCE flaw in OpenSSH on glibc-based Linux systems. Over 14 million servers are at risk, with potential root access. Qualys created an exploit but delays release for patching.

Read original articleLink Icon
Remote Unauthenticated Code Execution in OpenSSH Server

Qualys discovered a Remote Unauthenticated Code Execution (RCE) vulnerability, named regreSSHion, in OpenSSH's server affecting glibc-based Linux systems. This flaw allows unauthenticated remote code execution as root, posing a significant security risk. Over 14 million OpenSSH server instances are potentially vulnerable, with approximately 700,000 exposed to the internet. The vulnerability is a regression of a previously patched issue, emphasizing the importance of thorough regression testing. Qualys developed an exploit but will not release it immediately to allow time for patches. The impact of exploitation includes full system compromise, data manipulation, and network propagation. Mitigation steps involve patch management, enhanced access control, and network segmentation. Qualys offers tools like Vulnerability Management, Detection, and Response (VMDR) to address the risk effectively. Users are advised to patch urgently and monitor for exploitation attempts. The vulnerability affects Linux systems running specific versions of OpenSSH, while its impact on macOS and Windows remains uncertain.

Link Icon 4 comments
By @gnabgib - 4 months
Discussion (661 points, 16 hours ago, 250 comments) https://news.ycombinator.com/item?id=40843778
By @taspeotis - 4 months
By @Sparkyte - 4 months
People still use SSH these days?

I kid, but really you probably shouldn't on Production. You should be exporting your logs and everything else. The host or VM bootstrapped golden images with everything as needed.

It is okay to start that way and figure out your enternals but that isn't for Production. Production is a locked down closed environment.