CVE-2024-6387 (regreSSHion attack)

Written By Alessandro Scarafile (Super Administrator)

Updated at April 10th, 2025

This article provides information on how to mitigate the CVE-2024-6387 vulnerability.

→ Applies to: SynetoOS 4.x

 

Vulnerability description

The vulnerability, identified in the OpenSSH server, enables remote unauthenticated attackers to execute arbitrary code on the target server, presenting a severe risk to systems that utilize OpenSSH for secure communications. 

SOURCES
Vulcan (https://vulcan.io/blog/cve-2024-6387-how-to-fix-regresshion-vulnerability)

 

Solution

Update to the latest OpenSSH version, restrict SSH access to trusted networks, use key-based authentication, and monitor logs for unusual activity.

As a temporary fix, if updating is not feasible, set LoginGraceTime to 0.
 

Step 1. Connect to SynetoOS appliance via SSH as admin

ssh admin@<your_ip_address_or_hostname>

 

Step 2 (optional). Change into Solaris shell (in case you're directed to an unsupported shell)

un sh

 

Step 3. Get root privileges

sudo su -

 

Step 4. Update the SSH server config file

sed -i 's/^#\?\s*LoginGraceTime\s\+.*/LoginGraceTime 0/' /etc/ssh/sshd_config

 

Step 5. Restart the SSH server

svcadm restart svc:/network/ssh:default

 

Step 6. Check that the SSH service is online

svcs svc:/network/ssh:default