[CITL] Critical OpenSSH Vulnerability

Jonathan Ocab jonathan.ocab at ucr.edu
Mon Jul 1 10:33:10 PDT 2024


Attention all:

Qualys released a report on a critical vulnerability in OpenSSH dubbed
*regreSSHion*.

In summary, certain versions of OpenSSH with a specific configuration can
be exploited remotely to gain root access on the affected device.

Generally speaking, OpenSSH versions < 4.4p1 and >= 8.5p1 are vulnerable.
However, certain Linux distributions may not have a default configuration
that allows this vulnerability to be exploited.

While not inclusive of all Linux distributions, the following links provide
guidance for RHEL and Ubuntu.

RHEL guidance - https://access.redhat.com/security/cve/cve-2024-6387
Ubuntu guidance - https://ubuntu.com/security/CVE-2024-6387

UCR ITS does not impose a campus-wide block on inbound traffic to port 22
(common port for SSH servers) at this time. *Thus, we are asking all CITL
partners to review their inventory and implement patching as necessary as
soon as possible. *

If there are any questions regarding this notice, please reach out to
infosecoffice at ucr.edu.

Thank you.

ref.
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
(Qualys article)

---
Jonathan Ocab | jonathan.ocab at ucr.edu
Manager, Information Security Operations
Information Security Office
University of California, Riverside
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ucr.edu/pipermail/citl/attachments/20240701/94d2ec01/attachment.html>


More information about the CITL mailing list