Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
Configuration 23 (hide)
AND |
|
Configuration 24 (hide)
AND |
|
Configuration 25 (hide)
AND |
|
Configuration 26 (hide)
AND |
|
Configuration 27 (hide)
AND |
|
Configuration 28 (hide)
AND |
|
Configuration 29 (hide)
AND |
|
Configuration 30 (hide)
AND |
|
Configuration 31 (hide)
AND |
|
Configuration 32 (hide)
|
Configuration 33 (hide)
|
Configuration 34 (hide)
|
Configuration 35 (hide)
|
Configuration 36 (hide)
|
Configuration 37 (hide)
|
Configuration 38 (hide)
|
Configuration 39 (hide)
|
Configuration 40 (hide)
|
Configuration 41 (hide)
|
30 Sep 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:sonicwall:sma_6200:-:*:*:*:*:*:*:* cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:* cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a90:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_6200_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:c800:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_6210_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_7200_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_6210:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a1k:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:* cpe:2.3:h:netapp:a900:-:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:* cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_7210_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sra_ex_7000_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a70:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:c400:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_7210:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_8200v:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_7200:-:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:* cpe:2.3:h:netapp:a9500:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sra_ex_7000:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a150:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:fas2820:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_8200v_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:* |
|
First Time |
Arista
Netapp a1k Firmware Netapp a9500 Netapp a400 Firmware Sonicwall sma 6200 Netapp fas2750 Firmware Netapp fas2820 Firmware Netapp a250 Netapp ontap Netapp c190 Netapp fas2820 Netapp a800 Firmware Netapp 8300 Arista eos Netapp a9500 Firmware Netapp a150 Firmware Sonicwall sra Ex 7000 Firmware Netapp fas2750 Netapp 8700 Firmware Sonicwall sma 7200 Firmware Almalinux Netapp 8700 Netapp a250 Firmware Netapp active Iq Unified Manager Netapp c250 Netapp a70 Netapp hci Compute Node Netapp a700s Firmware Sonicwall sma 7210 Firmware Netapp a400 Sonicwall sma 6210 Firmware Netapp a800 Netapp c250 Firmware Netapp fas2720 Netapp a700s Sonicwall sma 7210 Netapp fas2720 Firmware Netapp bootstrap Os Apple macos Netapp a1k Netapp a220 Netapp a90 Almalinux almalinux Netapp 500f Sonicwall sra Ex 7000 Sonicwall sma 8200v Netapp a900 Netapp 500f Firmware Netapp a90 Firmware Netapp c190 Firmware Netapp 8300 Firmware Sonicwall sma 6200 Firmware Amazon amazon Linux Netapp c800 Netapp c400 Firmware Netapp a150 Netapp c400 Sonicwall sma 6210 Netapp a900 Firmware Netapp a220 Firmware Sonicwall sma 8200v Firmware Netapp a70 Firmware Apple Netapp c800 Firmware Sonicwall sma 7200 Sonicwall |
|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2294604Â - Third Party Advisory | |
References | () https://santandersecurityresearch.github.io/blog/sshing_the_masses.html - Exploit, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/18Â - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/Jul/19Â - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/Jul/20Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/01/12Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/01/13Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/02/1Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/1Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/11Â - Exploit, Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/2Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/3Â - Mailing List, Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/4Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/5Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/1Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/2Â - Exploit, Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/2Â - Exploit, Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/3Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/09/2Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/09/5Â - Exploit, Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/1Â - Exploit, Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/2Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/3Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/4Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/6Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/1Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/3Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/23/4Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/23/6Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/28/2Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/28/3Â - Mailing List | |
References | () https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/Â - Third Party Advisory | |
References | () https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/Â - Press/Media Coverage, Third Party Advisory | |
References | () https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server - Press/Media Coverage, Third Party Advisory | |
References | () https://explore.alas.aws.amazon.com/CVE-2024-6387.html - Third Party Advisory | |
References | () https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132Â - Issue Tracking | |
References | () https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc - Release Notes | |
References | () https://github.com/AlmaLinux/updates/issues/629Â - Issue Tracking | |
References | () https://github.com/Azure/AKS/issues/4379Â - Issue Tracking | |
References | () https://github.com/PowerShell/Win32-OpenSSH/discussions/2248Â - Issue Tracking | |
References | () https://github.com/PowerShell/Win32-OpenSSH/issues/2249Â - Issue Tracking | |
References | () https://github.com/microsoft/azurelinux/issues/9555Â - Issue Tracking | |
References | () https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09Â - Patch | |
References | () https://github.com/oracle/oracle-linux/issues/149Â - Issue Tracking | |
References | () https://github.com/rapier1/hpn-ssh/issues/87Â - Issue Tracking | |
References | () https://github.com/zgzhang/cve-2024-6387-poc - Third Party Advisory | |
References | () https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/Â - Third Party Advisory | |
References | () https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html - Mailing List, Release Notes | |
References | () https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html - Mailing List, Patch | |
References | () https://news.ycombinator.com/item?id=40843778Â - Issue Tracking, Patch | |
References | () https://packetstorm.news/files/id/190587/Â - Broken Link | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010Â - Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2024-6387Â - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240701-0001/Â - Third Party Advisory | |
References | () https://sig-security.rocky.page/issues/CVE-2024-6387/Â - Third Party Advisory | |
References | () https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/Â - Press/Media Coverage, Third Party Advisory | |
References | () https://support.apple.com/kb/HT214118Â - Third Party Advisory | |
References | () https://support.apple.com/kb/HT214119Â - Third Party Advisory | |
References | () https://support.apple.com/kb/HT214120Â - Third Party Advisory | |
References | () https://ubuntu.com/security/CVE-2024-6387Â - Third Party Advisory | |
References | () https://ubuntu.com/security/notices/USN-6859-1Â - Third Party Advisory | |
References | () https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do - Third Party Advisory | |
References | () https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100Â - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/52269Â - Exploit | |
References | () https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc - Third Party Advisory | |
References | () https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html - Third Party Advisory | |
References | () https://www.suse.com/security/cve/CVE-2024-6387.html - Third Party Advisory | |
References | () https://www.theregister.com/2024/07/01/regresshion_openssh/Â - Press/Media Coverage, Third Party Advisory | |
References | () https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387Â - Exploit, Third Party Advisory |
24 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 09:49
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2024:4312Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4340Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4389Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4469Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4474Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4479Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4484Â - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-6387Â - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2294604Â - Issue Tracking, Third Party Advisory | |
References | () https://santandersecurityresearch.github.io/blog/sshing_the_masses.html - | |
References | () https://www.openssh.com/txt/release-9.8Â - Release Notes, Third Party Advisory | |
References | () https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt - Exploit, Third Party Advisory |
14 Sep 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Jul 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Jul 2024, 18:07
Type | Values Removed | Values Added |
---|---|---|
CPE | ||
References | () http://www.openwall.com/lists/oss-security/2024/07/01/12Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/01/13Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/02/1Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/1Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/11Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/2Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/3Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/4Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/5Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/1Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/2Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/2Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/3Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/09/2Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/09/5Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/1Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/2Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/3Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/4Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/6Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/1Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/3Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/23/4Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/23/6Â - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4340Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4389Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4469Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4474Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4479Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4484Â - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2294604Â - Issue Tracking, Third Party Advisory | |
References | () https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132Â - Third Party Advisory | |
References | () https://github.com/AlmaLinux/updates/issues/629Â - Issue Tracking, Third Party Advisory | |
References | () https://github.com/Azure/AKS/issues/4379Â - Issue Tracking, Third Party Advisory | |
References | () https://github.com/PowerShell/Win32-OpenSSH/discussions/2248Â - Issue Tracking, Third Party Advisory | |
References | () https://github.com/PowerShell/Win32-OpenSSH/issues/2249Â - Issue Tracking, Third Party Advisory | |
References | () https://github.com/microsoft/azurelinux/issues/9555Â - Issue Tracking, Third Party Advisory | |
References | () https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09Â - Third Party Advisory | |
References | () https://github.com/oracle/oracle-linux/issues/149Â - Issue Tracking, Third Party Advisory | |
References | () https://github.com/rapier1/hpn-ssh/issues/87Â - Issue Tracking, Third Party Advisory | |
References | () https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/Â - Mailing List, Third Party Advisory | |
References | () https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html - Mailing List, Patch, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=40843778Â - Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do - Third Party Advisory | |
References | () https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100Â - Third Party Advisory | |
References | () https://www.openssh.com/txt/release-9.8Â - Release Notes, Third Party Advisory | |
References | () https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html - Third Party Advisory |
23 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Jul 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. |
11 Jul 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jul 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jul 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jul 2024, 15:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://sig-security.rocky.page/issues/CVE-2024-6387/Â - Third Party Advisory |
05 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-362 | |
First Time |
Openbsd
Redhat enterprise Linux Server Aus Netapp Freebsd freebsd Netapp ontap Select Deploy Administration Utility Amazon Netapp e-series Santricity Os Controller Freebsd Redhat openshift Container Platform Debian debian Linux Canonical Suse Netbsd netbsd Debian Openbsd openssh Suse linux Enterprise Micro Redhat enterprise Linux For Power Little Endian Eus Redhat enterprise Linux Redhat Canonical ubuntu Linux Redhat enterprise Linux For Arm 64 Eus Netapp ontap Tools Redhat enterprise Linux Eus Redhat enterprise Linux For Ibm Z Systems Eus Redhat enterprise Linux For Arm 64 Netbsd Redhat enterprise Linux For Power Little Endian Redhat enterprise Linux For Ibm Z Systems Amazon linux 2023 |
|
References |
|
|
References | () http://www.openwall.com/lists/oss-security/2024/07/01/12Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/01/13Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/02/1Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/1Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/11Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/2Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/3Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/4Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/5Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/1Â - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/2Â - Mailing List | |
References | () https://access.redhat.com/errata/RHSA-2024:4312Â - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-6387Â - Third Party Advisory | |
References | () https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/Â - Third Party Advisory | |
References | () https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/Â - Press/Media Coverage, Third Party Advisory | |
References | () https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server - Exploit, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2294604Â - Issue Tracking | |
References | () https://explore.alas.aws.amazon.com/CVE-2024-6387.html - Third Party Advisory | |
References | () https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc - Third Party Advisory | |
References | () https://github.com/AlmaLinux/updates/issues/629Â - Issue Tracking | |
References | () https://github.com/Azure/AKS/issues/4379Â - Issue Tracking | |
References | () https://github.com/PowerShell/Win32-OpenSSH/discussions/2248Â - Issue Tracking | |
References | () https://github.com/PowerShell/Win32-OpenSSH/issues/2249Â - Issue Tracking | |
References | () https://github.com/microsoft/azurelinux/issues/9555Â - Issue Tracking | |
References | () https://github.com/oracle/oracle-linux/issues/149Â - Issue Tracking | |
References | () https://github.com/rapier1/hpn-ssh/issues/87Â - Issue Tracking | |
References | () https://github.com/zgzhang/cve-2024-6387-poc - Third Party Advisory | |
References | () https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html - Mailing List, Third Party Advisory | |
References | () https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html - Mailing List, Patch | |
References | () https://news.ycombinator.com/item?id=40843778Â - Issue Tracking, Patch | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010Â - Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2024-6387Â - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240701-0001/Â - Third Party Advisory | |
References | () https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/Â - Third Party Advisory | |
References | () https://ubuntu.com/security/CVE-2024-6387Â - Third Party Advisory | |
References | () https://ubuntu.com/security/notices/USN-6859-1Â - Third Party Advisory | |
References | () https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc - Third Party Advisory | |
References | () https://www.openssh.com/txt/release-9.8Â - Release Notes | |
References | () https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt - Exploit, Third Party Advisory | |
References | () https://www.suse.com/security/cve/CVE-2024-6387.html - Third Party Advisory | |
References | () https://www.theregister.com/2024/07/01/regresshion_openssh/Â - Third Party Advisory | |
CPE | cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p11:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p9:*:*:*:*:*:* cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p8:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:* cpe:2.3:o:amazon:linux_2023:-:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p10:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p7:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:lts:*:*:* |
04 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2024-07-01 13:15
Updated : 2025-09-30 13:52
NVD link : CVE-2024-6387
Mitre link : CVE-2024-6387
CVE.ORG link : CVE-2024-6387
JSON object : View
netapp
- 8700_firmware
- a400
- fas2720
- fas2750_firmware
- ontap_select_deploy_administration_utility
- a70
- a150_firmware
- c190
- fas2820
- a250
- 500f
- a800_firmware
- bootstrap_os
- e-series_santricity_os_controller
- a9500
- a220_firmware
- c250
- c400
- a900
- a220
- fas2720_firmware
- a150
- a1k_firmware
- a90
- fas2820_firmware
- c800
- ontap_tools
- a1k
- c250_firmware
- a700s_firmware
- a900_firmware
- fas2750
- active_iq_unified_manager
- a700s
- a800
- a9500_firmware
- hci_compute_node
- 500f_firmware
- a90_firmware
- c400_firmware
- c190_firmware
- 8700
- a70_firmware
- a400_firmware
- c800_firmware
- a250_firmware
- ontap
- 8300
- 8300_firmware
sonicwall
- sma_8200v
- sma_7200
- sma_7200_firmware
- sra_ex_7000
- sma_6200
- sma_6200_firmware
- sma_6210_firmware
- sma_7210_firmware
- sma_8200v_firmware
- sra_ex_7000_firmware
- sma_6210
- sma_7210
amazon
- amazon_linux
almalinux
- almalinux
redhat
- openshift_container_platform
- enterprise_linux_for_arm_64_eus
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_arm_64
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux
- enterprise_linux_server_aus
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_eus
freebsd
- freebsd
netbsd
- netbsd
canonical
- ubuntu_linux
arista
- eos
debian
- debian_linux
suse
- linux_enterprise_micro
apple
- macos
openbsd
- openssh