• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10403
{Industry-Wide} openSSH server vulnerability :: CVE-2024-6387 "regreSSHion" Information
Publication ID: SAP10403
Resolved Status: Open
Published on: 2 July 2024 2:44 GMT
Last updated on: 2 July 2024 2:45 GMT

Overview

On July 1, 2024, D-Link became aware of a disclosure for a vulernability named "regreSSHion" which is an exploit in the openSSH server affecting many linux platfrom.

 

OpenSSH Server Versions from 4.4p1 up to, but not including, 8.5p1 are not vulnerable. The bad news is that the vulnerability resurfaced in OpenSSH 8.5p1 up to, but not including, 9.8p1 due to the accidental removal of a critical component.

 

For users is that there's no patch, yet. To protect against the regreSSHion vulnerability, set LoginGraceTime to 0 in the sshd configuration file (by default, this file is /etc/ssh/sshd_config). This setting is not a perfect solution; it will prevent exploits but exposes your systems to potential denial-of-service (DoS) attacks.

 

D-Link Corporation is currently investigating the scope if any on the D-Link Device product-line.  We continue to monitor the community, as to 07/02/2024 we are not aware of a fully qualiifed patch for the exploit. 

 

Please reference this announement for further information once available.

 

     - CVE-2024-6387 : Link

     - Qualsys : Link

 

Regarding the Security Update for Your D-Link Device

Installing firmware updates is critical in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the firmware update, it is essential to ALWAYS validate its success by comparing the firmware version on your product interface to the firmware update version.

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.