CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-67427
8.14.50%

regreSSHion: The Ghost of Vulnerabilities Past Haunts OpenSSH

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 6, 2026·6 min read·3 visits

Weaponized

Executive Summary (TL;DR)

OpenSSH's sshd server has a race condition in its SIGALRM handler. If a client disconnects precisely when the LoginGraceTime expires, the signal handler calls non-async-signal-safe functions (syslog). This corrupts the glibc heap, leading to potential RCE as root. It affects versions 8.5p1 through 9.7p1.

A signal handler race condition in OpenSSH's server (sshd) allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems. This is a regression of a vulnerability originally fixed in 2006 (CVE-2006-5051).

Official Patches

OpenSSHOpenSSH 9.8 Release Notes

Fix Analysis (1)

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
4.50%
Top 15% most exploited
14,000,000
Estimated exposed hosts via Shodan

Affected Systems

Linux systems using glibcOpenSSH Server 8.5p1 through 9.7p1

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenSSH
OpenBSD
>= 8.5p1, < 9.8p19.8p1
AttributeDetail
CWE IDCWE-364
Attack VectorNetwork
CVSS v3.18.1
ImpactRemote Code Execution (Root)
Exploit StatusHigh Complexity PoC
Architecturex86 (glibc)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1068Exploitation for Privilege Escalation
Privilege Escalation
CWE-364
Signal Handler Race Condition

Signal Handler Race Condition

Known Exploits & Detection

Qualys Security AdvisoryDetailed technical analysis and exploitation strategy by Qualys Threat Research Unit.
NucleiDetection Template Available

Vulnerability Timeline

Original bug (CVE-2006-5051) fixed
2006-09-28
Regression introduced in OpenSSH 8.5p1
2020-10-01
CVE-2024-6387 Disclosed by Qualys
2024-07-01
OpenSSH 9.8p1 released
2024-07-01

References & Sources

  • [1]regreSSHion: RCE in OpenSSH server
  • [2]Qualys Blog Post
Related Vulnerabilities
CVE-2006-5051CVE-2024-6387

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.