CVE-2024-6387

CVE-2024-6387: regreSSHion - Time is a Flat Circle (of Root Shells)

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 3, 2026·5 min read·5 visits

Executive Summary (TL;DR)

OpenSSH's sshd calls unsafe functions (syslog) inside a signal handler. By winning a precise race condition, an attacker can corrupt the heap and gain unauthenticated root access. It takes about 6-8 hours of continuous attempts to exploit, but the result is a full system compromise.

A signal handler race condition in OpenSSH's server (sshd) allows unauthenticated remote attackers to achieve root code execution on glibc-based Linux systems. This is a regression of CVE-2006-5051, proving that code history repeats itself if you don't write regression tests.

Fix Analysis (1)

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
4.20%
Top 15% most exploited
14,000,000
via Shodan

Affected Systems

OpenSSH servers running on glibc-based Linux systemsVersions 8.5p1 through 9.7p1

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenSSH
OpenBSD
>= 8.5p1, < 9.8p19.8p1
AttributeDetail
Attack VectorNetwork (Port 22)
ComplexityHigh (Race Condition)
PrivilegesNone (Unauthenticated)
CVSS v3.18.1 (High)
CWECWE-364: Signal Handler Race Condition
Exploit StatusProof of Concept Available
CWE-364
Signal Handler Race Condition

The software executes a signal handler that calls a non-reentrant function, leading to undefined behavior or memory corruption.

Vulnerability Timeline

Vulnerability Disclosed by Qualys
2024-07-01
OpenSSH 9.8p1 Released
2024-07-01
Added to CISA KEV
2024-07-08

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.