КућаМалвер и претњеQualys reports reintroduction of OpenSSH bug after patch

Qualys reports reintroduction of OpenSSH bug after patch

Објављено на

spot_img

Qualys, a cybersecurity firm, issued a notification stating that more than 14 million servers worldwide could be at risk from a vulnerability in OpenSSH, a remote server management and file transfer tool. This flaw, known as “regreSSHion,” allows hackers to exploit unauthenticated remote code execution, granting them root privileges on glibc-based Linux systems.

The vulnerability, tracked as CVE-2024-6387, poses a significant threat as it permits attackers to execute arbitrary code with the highest privileges. This could lead to various malicious activities such as installing malware, data manipulation, creating backdoors for persistent access, and network propagation to compromise other vulnerable systems within an organization.

Interestingly, Qualys had initially patched this bug back in 2006. However, due to a case of “regression,” where a once-resolved issue resurfaces in a later software release, the flaw was inadvertently reintroduced in OpenSSH version 8.5p1 in October 2020. This oversight highlights the complexities involved in maintaining secure software environments and the potential risks of unintended consequences following updates or changes.

Although exploiting the vulnerability may require multiple attempts, Qualys warns that attackers could utilize artificial intelligence tools to significantly enhance their exploitation efforts. To mitigate the risk, the researchers recommend updating OpenSSH servers to version 9.8p1 and implementing network-based access controls and segmentation to prevent lateral movement by threat actors.

Additionally, a technical blog released by Qualys outlines various mitigation strategies for organizations to protect against potential attacks leveraging the “regreSSHion” vulnerability. These include setting specific configurations in the SSH daemon file and considering the trade-offs between security and potential denial-of-service vulnerabilities when applying workarounds.

While the primary focus is on glibc-based Linux systems, researchers suggest that the flaw could also exist on macOS and Windows platforms. However, the exploitability of the vulnerability on these systems remains unconfirmed, emphasizing the need for further investigation and proactive security measures.

In conclusion, the resurgence of a long-patched vulnerability in OpenSSH serves as a stark reminder of the ongoing challenges in maintaining secure software ecosystems. With millions of servers potentially affected, organizations must prioritize timely updates, robust access controls, and continuous monitoring to safeguard against evolving cyber threats and vulnerabilities.

Извор линк

Најновији чланци

99% of IoT exploitation attempts are based on already known CVEs

The proliferation of Internet of Things (IoT) devices has led to a slew of...

Experts say cybercrime groups are reorganizing following significant crackdowns

Cybercrime gangs are facing a challenging year, as recent global police operations have significantly...

Combatting Financial Crime and Achieving Business Success with KYB

Financial crimes have become a significant threat to the global financial system, compromising its...

Malware posing as generative AI tools stealing information

In the past six months, a significant increase in Android financial threats has been...

Више овако

99% of IoT exploitation attempts are based on already known CVEs

The proliferation of Internet of Things (IoT) devices has led to a slew of...

Experts say cybercrime groups are reorganizing following significant crackdowns

Cybercrime gangs are facing a challenging year, as recent global police operations have significantly...

Combatting Financial Crime and Achieving Business Success with KYB

Financial crimes have become a significant threat to the global financial system, compromising its...
sr_RSSerbian