Last Wednesday, the FreeBSD security team issued an advisory (CVE-2024-7589) regarding a high-rated vulnerability in #OpenSSH when running on the FreeBSD operating system. This vulnerability mirrors the earlier #regreSSHion vulnerability. Check out our blog for tips on how to identify potentially vulnerable systems: https://www.runzero.com/blog/openssh-servers/
Latest OpenSSH vulnerabilities: How to find impacted systems

In February 2025, two vulnerabilities (CVE-2025-26465 and CVE-2025-26466) were discovered in the OpenSSH software. Here's how to find affected systems.

runZero

regreSSHion | @bsdbcr @Tubsta

Listen now: bsdnow.tv/568

#regreSSHion vulnerability, Improving and debugging #FreeBSDs Intel wifi support, FreeBSD adds an implementation of the 9P filesystem, FreeBSD Zero to Desktop Speedrun Challenge, and more
#BSD #SSH

Podcast NoLimitSecu - Episode #465 consacré à la #vulnérabilité #RegreSSHion qui permet d’exécuter du code à distance dans #OpenSSH
https://www.nolimitsecu.fr/regresshion/
RegreSSHion - NoLimitSecu

Episode #465 consacré à la vulnérabilité RegreSSHion qui permet d’exécuter du code à distance dans OpenSSH  Références :  https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server   Exploitability : https://news.ycombinator.com/item?id=40844022   Malicious exploits : https://www.kaspersky.com/blog/cve-2024-6387-regresshion-researcher-attack/51646/ https://santandersecurityresearch.github.io/blog/sshing_the_masses   Autres: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-009/ https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt https://www.openwall.com/lists/oss-security/2024/07/08/2 (la deuxième CVE, à savoir CVE-2024-6409)    

NoLimitSecu

@eroc1990 @JohnDal I disagree, as all such #SupplyChainAttacks are merely based upon lack or #reviewers and lack of #funding.

Not to mention it's easier and faster to fix #FOSS as well as the #diversity of systems mitigate said issues (i.e. #dropbear was affected by neither #RegreSSHion #XZ's #backdoor, likely preventing another #Mirai-Style #Botnet from being created...

After all, these issues are systemic, and denying the root cause is turning a blind eye at the obvious fix!

🚨 Protect your systems! Scan for the critical OpenSSH vulnerability CVE-2024-6387 (regreSSHion) and the older flaws CVE-2006-5051 and CVE-2008-4109. Use the SecPoint Penetrator V60 to detect and fix these security risks effectively. Stay secure! https://www.secpoint.com 🔐 #CyberSecurity #OpenSSH #Vulnerability #SecPoint #regreSSHion #SecPointPenetrator #Penetrator #CyberSecurityNews
SecPoint | Vulnerability Scanning | UTM Firewall | WiFi Pentest

SecPoint Cyber Security Company - Best #1 Cyber Security Vendor. Penetrator Vulnerability Scanning - Protector UTM Firewall - WiFi Pen Testing

While updating my personal #netbsd server to patch #regresshion, I updated all my installed packages, which broke #php, which broke apache.

So I shaved all those #yaks and discovered that my CMS (#textpattern) was years out of date, and not compatible with modern PHP. And my self-written tagging plugin would require changes, if I upgraded.

So <big sigh of relief> I am finally rid of PHP, Apache, and MySQL on that server! That feels really good. (Even if I'm sad my old content is gone.)

So I just read on @dcuthbert 's ( not that active on Masto - so @[email protected] for sauce) writeup on the #regresshion #poc backdoor ( https://bird.makeup/users/dcuthbert/statuses/1811327974513295432)

While they point out they would have used LKM to hide processes better, I just ran into something I didn't consider in hiding processes, PID namespaces !

Edit 1(disclaimer, I'm ignorant): This is a half baked thought process, and I haven't tested out this theory.. Might be a foot in mouth moment!

This idea courtesy of #synology 's distro with their NAS (maybe their router software too).

My Synology runs their "ContainerManager" package which is just docker. In the ContainerManager, I am running jellyfin and gitea.

My usual experience in seeing what containers are running from a system defaults PoV from the shell I can run ps auxw or ps -eLf and I will expect to see the processes running from docker. I've attached a screenshot of docker in arch running jellyfin.

There's also a screenshot of jellfyin running in Synology's 'locked down OS'. You can see its running, because docker ps -a tells us so.

Heck from a system point of view, you can't even see docker/containerd running like you can from other Linux distros. Whats going on?

Namespaces!

Its not just for containers, available on enabled Linux kernels everywhere!

Check out @b0rk most excellent intro and writeup on it if you're not familiar. [https://jvns.ca/blog/2016/10/10/what-even-is-a-container/]

Can you turn off namespaces on servers not meant to run containers? I believe you can restrict them with sysctl calls but I'm unsure of modern day distros for server use need them.

So do you trust your vuln management sytems to help you know whats actually running on systems anymore? ;)

Edit 2:
if you want to see what Synology is doing and don't have a Synology device you can run their distro in a virtual machine. I don't know if you can really trust this or not, but I've used it in the past. Use at your own risk.

The Redpill pre-install and Recovery environment.
[https://github.com/RROrg/rr]

Synology DSM
[https://archive.synology.com/download/Os/DSM]

#infosec #containers #docker #linux #security

Daniel Cuthbert

It was off the back of the recent regreSSHion (CVE-2024-6387) p0c code that my spidey senses went into overdrive and resulted in @v1ad_o and I tearing apart a pretty sweet rootkit targeting TI/sec researchers https://santandersecurityresearch.github.io/blog/sshing_the_masses

This Week In Security: Blast-RADIUS, Gitlab, And Plormbing

The RADIUS authentication scheme, short for “Remote Authentication Dial-In User Service”, has been widely deployed for user authentication in all sorts of scenarios. It’s a bit od…

Hackaday
Wow, PoC for #regreSSHion vuln is a malware package for Phunware with persistence: https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
blog

The public blog of Santander Cyber Security Research

blog