SUMMARY
This notice covers CVE-2024-6387 OpenSSH vulnerability (nicknamed “regreSSHion”) and its impact related to GreenRADIUS.
GreenRADIUS is accessed using SSH from an internal (on prem) origin and therefore normally protected by an external firewall. This means that this CVE is normally not possible to exploit from an external originating source, but for GreenRADIUS instances that are SSH-exposed directly to the Internet, we have a GreenRADIUS v5.2.8.8-2 Hotfix (released earlier this month). Please note that this hotfix should be applied to both internally and externally exposed GreenRADIUS instances as soon as possible.
CVE-2024-6387
A security regression listed as CVE-2006-5051 (CVSS score 8.1) was discovered in OpenSSH’s server (sshd), affecting OpenSSH versions 8.5p1 through 9.7p1. There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
A similar vulnerability is tracked as CVE-2024-6409 (CVSS score: 7.0), while affecting only versions 8.7p1 and 8.8p1, specifically, those shipped with Red Hat Enterprise Linux 9, as well as their corresponding portable releases. This CVE is therefore NOT affecting GreenRADIUS as it is based on Ubuntu distribution.