Cisco has issued a security advisory regarding a critical remote code execution (RCE) vulnerability, dubbed “regreSSHion,” that affects multiple products.
The vulnerability tracked as CVE-2024-6387, was disclosed by the Qualys Threat Research Unit on July 1, 2024. It impacts the OpenSSH server (sshd) in glibc-based Linux systems and has the potential to allow unauthenticated attackers to gain root access to affected systems.
The regreSSHion vulnerability is a regression of an older flaw (CVE-2006-5051) that was reintroduced in OpenSSH version 8.5p1, released in October 2020.
Join our free webinar to learn about combating slow DDoS attacks, a major threat today.
The flaw involves a race condition in the sshd’s SIGALRM handler, which calls functions that are not async-signal-safe, such as syslog()
.
An attacker can exploit this by opening multiple connections and failing to authenticate within the LoginGraceTime period, triggering the vulnerable signal handler asynchronously.
Cisco has identified several products across various categories affected by this vulnerability.
The company is actively investigating its product line to determine the full scope of impacted devices. The following table lists the affected products and their respective Cisco Bug IDs:
Product Category | Product Name | Cisco Bug ID | Fixed Release Availability |
---|---|---|---|
Network and Content Security Devices | Adaptive Security Appliance (ASA) Software | CSCwk61618 | |
Firepower Management Center (FMC) Software | CSCwk61618 | ||
Firepower Threat Defense (FTD) Software | CSCwk61618 | ||
FXOS Firepower Chassis Manager | CSCwk62297 | ||
Identity Services Engine (ISE) | CSCwk61938 | ||
Secure Network Analytics | CSCwk62315 | ||
Network Management and Provisioning | Crosswork Data Gateway | CSCwk62311 | 7.0.0 (Aug 2024) |
Cyber Vision | CSCwk62289 | ||
DNA Spaces Connector | CSCwk62273 | ||
Prime Infrastructure | CSCwk62276 | ||
Smart Software Manager On-Prem | CSCwk62288 | ||
Virtualized Infrastructure Manager | CSCwk62277 | ||
Routing and Switching – Enterprise and Service Provider | ASR 5000 Series Routers | CSCwk62248 | |
Nexus 3000 Series Switches | CSCwk61235 | ||
Nexus 9000 Series Switches in standalone NX-OS mode | CSCwk61235 | ||
Unified Computing | Intersight Virtual Appliance | CSCwk63145 | |
Voice and Unified Communications Devices | Emergency Responder | CSCwk63694 | |
Unified Communications Manager | CSCwk62318 | ||
Unified Communications Manager IM & Presence Service | CSCwk63634 | ||
Unity Connection | CSCwk63494 | ||
Video, Streaming, TelePresence, and Transcoding Devices | Cisco Meeting Server | CSCwk62286 | SMU – CMS 3.9.2 (Aug 2024) |
Cisco recommends several steps to mitigate the risk of exploitation:
LoginGraceTime
parameter to 0 in the sshd configuration file to prevent the race condition, although this may lead to denial-of-service if all connection slots become occupied[1][6][7].The Cisco Product Security Incident Response Team (PSIRT) knows that a proof-of-concept exploit code is available for this vulnerability. However, the exploitation requires customization, and there have been no reports of malicious use.
Cisco continues to assess all products and services for impact and will update the advisory as new information becomes available.
The regreSSHion vulnerability poses a significant risk to a wide range of Cisco products.
Customers are urged to follow Cisco’s recommendations and apply the necessary patches and mitigations to protect their systems from potential exploitation.
"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo
Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…
In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…
Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…
The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…
By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…
According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…