[CITL] Critical OpenSSH Vulnerability
Jonathan Ocab
jonathan.ocab at ucr.edu
Mon Jul 1 10:33:10 PDT 2024
Attention all:
Qualys released a report on a critical vulnerability in OpenSSH dubbed
*regreSSHion*.
In summary, certain versions of OpenSSH with a specific configuration can
be exploited remotely to gain root access on the affected device.
Generally speaking, OpenSSH versions < 4.4p1 and >= 8.5p1 are vulnerable.
However, certain Linux distributions may not have a default configuration
that allows this vulnerability to be exploited.
While not inclusive of all Linux distributions, the following links provide
guidance for RHEL and Ubuntu.
RHEL guidance - https://access.redhat.com/security/cve/cve-2024-6387
Ubuntu guidance - https://ubuntu.com/security/CVE-2024-6387
UCR ITS does not impose a campus-wide block on inbound traffic to port 22
(common port for SSH servers) at this time. *Thus, we are asking all CITL
partners to review their inventory and implement patching as necessary as
soon as possible. *
If there are any questions regarding this notice, please reach out to
infosecoffice at ucr.edu.
Thank you.
ref.
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
(Qualys article)
---
Jonathan Ocab | jonathan.ocab at ucr.edu
Manager, Information Security Operations
Information Security Office
University of California, Riverside
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ucr.edu/pipermail/citl/attachments/20240701/94d2ec01/attachment.html>
More information about the CITL
mailing list