CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-6409: Openssh: possible remote code execution due to a race condition in signal handling affecting red hat enterprise linux 9

Description

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

Classification

CVE ID: CVE-2024-6409

Problem Types

Signal Handler Race Condition

Affected Products

Vendor: , Red Hat

Product: , Red Hat Enterprise Linux 9, Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions, Red Hat Enterprise Linux 9.2 Extended Update Support, Red Hat OpenShift Container Platform 4.13, Red Hat OpenShift Container Platform 4.14, Red Hat OpenShift Container Platform 4.15, Red Hat OpenShift Container Platform 4.16, Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8

Exploit Prediction Scoring System (EPSS)

EPSS Score: 70.2% (probability of being exploited)

EPSS Percentile: 98.57% (scored less or equal to compared to others)

EPSS Date: 2025-06-20 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-6409
https://access.redhat.com/errata/RHSA-2024:4457
https://access.redhat.com/errata/RHSA-2024:4613
https://access.redhat.com/errata/RHSA-2024:4716
https://access.redhat.com/errata/RHSA-2024:4910
https://access.redhat.com/errata/RHSA-2024:4955
https://access.redhat.com/errata/RHSA-2024:4960
https://access.redhat.com/errata/RHSA-2024:5444
https://access.redhat.com/security/cve/CVE-2024-6409
https://bugzilla.redhat.com/show_bug.cgi?id=2295085

Timeline