Critical Security Alert regreSSHion RCE Vulnerability Affects Multiple Cisco Products
Critical Security Alert: regreSSHion RCE Vulnerability Affects Multiple Cisco Products
As students preparing for competitive exams, it is essential to stay updated on the latest security threats and vulnerabilities that can impact your systems and devices. In this regard, Cisco has issued a critical security advisory regarding a remote code execution (RCE) vulnerability, dubbed “regreSSHion,” which affects multiple products.
Vulnerability Details
The regreSSHion vulnerability, tracked as CVE-2024-6387, was disclosed by the Qualys Threat Research Unit on July 1, 2024. It affects the OpenSSH server (sshd) in glibc-based Linux systems, allowing unauthenticated attackers to gain root access to affected systems. This vulnerability is a regression of an older flaw (CVE-2006-5051) that was reintroduced in OpenSSH version 8.5p1, released in October 2020.
The flaw involves a race condition in the sshd’s SIGALRM handler, which calls functions that are not async-signal-safe, such as syslog(). An attacker can exploit this by opening multiple connections and failing to authenticate within the LoginGraceTime period, triggering the vulnerable signal handler asynchronously.
Affected Products
Cisco has identified several products across various categories affected by this vulnerability. The company is actively investigating its product line to determine the full scope of impacted devices. The following table lists the affected products and their respective Cisco Bug IDs:
Product Category | Product Name | Cisco Bug ID | Fixed Release Availability |
---|---|---|---|
Network and Content Security | Adaptive Security Appliance (ASA) Software | CSCwk61618 | - |
Firepower Management Center (FMC) Software | CSCwk61618 | - | |
Firepower Threat Defense (FTD) Software | CSCwk61618 | - | |
FXOS Firepower Chassis Manager | CSCwk62297 | - | |
Identity Services Engine (ISE) | CSCwk61938 | - | |
Secure Network Analytics | CSCwk62315 | 7.0.0 (Aug 2024) | |
Crosswork Data Gateway | CSCwk62311 | - | |
Cyber Vision | CSCwk62289 | - | |
DNA Spaces Connector | CSCwk62273 | - | |
Prime Infrastructure | CSCwk62276 | - | |
Smart Software Manager On-Prem | CSCwk62288 | - | |
Virtualized Infrastructure Manager | CSCwk62277 | - | |
Routing and Switching – Enterprise and Service Provider | ASR 5000 Series Routers | CSCwk62248 | - |
Nexus 3000 Series Switches | CSCwk61235 | - | |
Nexus 9000 Series Switches in standalone NX-OS mode | CSCwk61235 | - | |
Unified Computing | Intersight Virtual Appliance | CSCwk63145 | - |
Voice and Unified Communications | Emergency Responder | CSCwk63694 | - |
Unified Communications Manager | CSCwk62318 | - | |
Unified Communications Manager IM & Presence Service | CSCwk63634 | - | |
Unity Connection | CSCwk63494 | - | |
Video, Streaming, TelePresence, and Transcoding | Cisco Meeting Server | CSCwk62286 | SMU – CMS 3.9.2 (Aug 2024) |
Mitigation and Recommendations
To mitigate the risk of exploitation, Cisco recommends the following steps:
- Restrict SSH Access: Limit SSH access to trusted hosts only by applying infrastructure access control lists (ACLs) to prevent unauthorized access to SSH services.
- Upgrade OpenSSH: Upgrade to the latest patched version of OpenSSH (9.8p1) as soon as it becomes available in the package repositories of Linux distributions.
- Adjust LoginGraceTime: Set the LoginGraceTime parameter to 0 in the sshd configuration file to prevent the race condition, although this may lead to denial-of-service if all connection slots become occupied.
Important Notice
The Cisco Product Security Incident Response Team (PSIRT) knows that a proof-of-concept exploit code is available for this vulnerability. However, the exploitation requires customization, and there have been no reports of malicious use. Cisco continues to assess all products and services for impact and will update the advisory as new information becomes available.
Action Required
Customers are urged to follow Cisco’s recommendations and apply the necessary patches and mitigations to protect their systems from potential exploitation. It is crucial to stay vigilant and take proactive measures to ensure the security of your devices and systems.
Historical Context:
The regreSSHion vulnerability, tracked as CVE-2024-6387, is a critical remote code execution (RCE) vulnerability that affects multiple Cisco products. This vulnerability is a regression of an older flaw (CVE-2006-5051) that was reintroduced in OpenSSH version 8.5p1, released in October 2020. The flaw involves a race condition in the sshd’s SIGALRM handler, which calls functions that are not async-signal-safe, such as syslog(). An attacker can exploit this by opening multiple connections and failing to authenticate within the LoginGraceTime period, triggering the vulnerable signal handler asynchronously.
Summary in Bullet Points:
- The regreSSHion vulnerability, tracked as CVE-2024-6387, is a critical remote code execution (RCE) vulnerability that affects multiple Cisco products.
- The vulnerability is a regression of an older flaw (CVE-2006-5051) that was reintroduced in OpenSSH version 8.5p1, released in October 2020.
- The flaw involves a race condition in the sshd’s SIGALRM handler, which calls functions that are not async-signal-safe, such as syslog().
- An attacker can exploit this by opening multiple connections and failing to authenticate within the LoginGraceTime period, triggering the vulnerable signal handler asynchronously.
- Affected products include:
- Network and Content Security: Adaptive Security Appliance (ASA) Software, Firepower Management Center (FMC) Software, Firepower Threat Defense (FTD) Software, FXOS Firepower Chassis Manager, and more.
- Routing and Switching – Enterprise and Service Provider: ASR 5000 Series Routers, Nexus 3000 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, and more.
- Unified Computing: Intersight Virtual Appliance
- Voice and Unified Communications: Emergency Responder, Unified Communications Manager, Unified Communications Manager IM & Presence Service, Unity Connection, and more.
- Video, Streaming, TelePresence, and Transcoding: Cisco Meeting Server
- Mitigation and recommendations:
- Restrict SSH access to trusted hosts only by applying infrastructure access control lists (ACLs) to prevent unauthorized access to SSH services.
- Upgrade to the latest patched version of OpenSSH (9.8p1) as soon as it becomes available in the package repositories of Linux distributions.
- Adjust the LoginGraceTime parameter to 0 in the sshd configuration file to prevent the race condition, although this may lead to denial-of-service if all connection slots become occupied.
- Important notice: A proof-of-concept exploit code is available for this vulnerability, but exploitation requires customization, and there have been no reports of malicious use.
- Action required: Customers are urged to follow Cisco’s recommendations and apply the necessary patches and mitigations to protect their systems from potential exploitation.