CVE-2024-6387

8.1 HIGH
Published: July 01, 2024 Modified: September 30, 2025

Description

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4312
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4340
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4389
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4469
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4474
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4479
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4484
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2024-6387
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2294604
Source: secalert@redhat.com
Third Party Advisory
https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
Source: secalert@redhat.com
Exploit Third Party Advisory
https://www.openssh.com/txt/release-9.8
Source: secalert@redhat.com
Release Notes Third Party Advisory
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
Source: secalert@redhat.com
Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/18
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://seclists.org/fulldisclosure/2024/Jul/19
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://seclists.org/fulldisclosure/2024/Jul/20
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/01/12
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/01/13
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/02/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/11
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/07/03/4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/5
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/04/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/04/2
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/07/08/2
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/07/08/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/09/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/09/5
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/1
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/6
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/11/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/11/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/23/4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/23/6
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/28/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/28/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://access.redhat.com/errata/RHSA-2024:4312
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4340
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4389
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4469
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4474
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4479
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4484
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2024-6387
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/
Source: af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2294604
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://explore.alas.aws.amazon.com/CVE-2024-6387.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/AlmaLinux/updates/issues/629
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/Azure/AKS/issues/4379
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/PowerShell/Win32-OpenSSH/discussions/2248
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/PowerShell/Win32-OpenSSH/issues/2249
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/microsoft/azurelinux/issues/9555
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/oracle/oracle-linux/issues/149
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/rapier1/hpn-ssh/issues/87
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/zgzhang/cve-2024-6387-poc
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Release Notes
https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://news.ycombinator.com/item?id=40843778
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch
https://packetstorm.news/files/id/190587/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2024-6387
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240701-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://sig-security.rocky.page/issues/CVE-2024-6387/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/
Source: af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage Third Party Advisory
https://support.apple.com/kb/HT214118
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/kb/HT214119
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/kb/HT214120
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://ubuntu.com/security/CVE-2024-6387
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://ubuntu.com/security/notices/USN-6859-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/52269
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.openssh.com/txt/release-9.8
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes Third Party Advisory
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.suse.com/security/cve/CVE-2024-6387.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.theregister.com/2024/07/01/regresshion_openssh/
Source: af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage Third Party Advisory
https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory

91 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.1 / 10.0
EPSS (Exploit Probability)
50.8%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

redhat apple amazon openbsd suse sonicwall canonical arista freebsd netapp +3 more