8.1
CWE
362
Advisory Published
Advisory Published
Updated
Advisory Published

FG-IR-24-258: OpenSSH regreSSHion Attack (CVE-2024-6387)

First published: Fri Oct 11 2024(Updated: )

CVE-2024-6387 A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). This could lead to remote code execution with root privileges.

Affected SoftwareAffected VersionHow to fix
Fortinet FortiADC>=7.4.0<=7.4.4
Fortinet FortiADC>=7.2.0<=7.2.6
Fortinet FortiAIOps>=2.0.0<=2.0.1
Fortinet FortiAnalyzer>=7.4.0<=7.4.3
Fortinet FortiAnalyzer>=7.2.0<=7.2.5
Fortinet FortiAnalyzer>=7.0.0<=7.0.12
Fortinet FortiAnalyzer>=6.4.0<=6.4.14
Fortinet FortiAnalyzer=.
Fortinet FortiAuthenticator>=6.6.0<=6.6.1
Fortinet FortiDDoS-F>=5.7.0<=5.7.3
Fortinet FortiDDoS-F>=7.0.0<=7.0.1
Fortinet FortiDeceptor>=5.3.0<=5.3.1
Fortinet FortiDeceptor=.
Fortinet FortiExtender Firmware>=7.4.0<=7.4.5
Fortinet FortiExtender Firmware>=7.2.0<=7.2.5
Fortinet FortiExtender Firmware>=7.0.0<=7.0.5
Fortinet FortiLANCloud>=23
Fortinet FortiLANCloud>=22
Fortinet Fortimail-200d>=7.4.0<=7.4.2
Fortinet Fortimail-200d>=7.2.0<=7.2.6
Fortinet Fortimail-200d>=7.0.0<=7.0.7
Fortinet Fortimail-200d>=6.4.0<=6.4.8
Fortinet FortiManager>=7.4.0<=7.4.3
Fortinet FortiManager>=7.2.0<=7.2.5
Fortinet FortiManager>=7.0.0<=7.0.12
Fortinet FortiManager>=6.4.0<=6.4.14
Fortinet FortiManager Cloud>=7.2.3<=7.2.4
Fortinet FortiManager Cloud=.
Fortinet FortiManager Cloud=.
Fortinet FortiManager Cloud>=7.0.6<=7.0.7
Fortinet FortiNAC=.
Fortinet FortiNAC>=7.2.0<=7.2.6
Fortinet FortiRecorder 400D>=7.2.0<=7.2.1
Fortinet FortiRecorder 400D>=7.0.0<=7.0.4
Fortinet FortiRecorder 400D>=6.4.0<=6.4.5
Fortinet FortiRecorder 400D>=6.0.0<=6.0.12
Fortinet FortiSandbox Firmware>=4.4.0<=4.4.6
Fortinet FortiSandbox Firmware>=4.2.0<=4.2.7
Fortinet FortiSandbox Firmware>=4.0.0<=4.0.5
Fortinet FortiSandbox Firmware>=3.2
Fortinet FortiSwitch>=7.4.0<=7.4.3
Fortinet FortiSwitch>=7.2.0<=7.2.8
Fortinet FortiTester>=7.4.0<=7.4.2
Fortinet FortiTester>=7.3.0<=7.3.2
Fortinet FortiTester>=7.2.0<=7.2.3
Fortinet FortiVoice Enterprise>=7.0.0<=7.0.2
Fortinet FortiVoice Enterprise>=6.4.0<=6.4.9
Fortinet FortiWLC>=8.6.0<=8.6.7
Fortinet FortiWeb=.
Fortinet FortiWeb>=7.4.0<=7.4.4
Fortinet FortiWeb>=7.2.0<=7.2.9

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of FG-IR-24-258?

    The severity of FG-IR-24-258 is considered high due to the potential for unauthorized access if exploited.

  • How do I fix FG-IR-24-258?

    To fix FG-IR-24-258, upgrade your affected Fortinet products to the recommended version specified in the advisory.

  • Which Fortinet products are affected by FG-IR-24-258?

    FG-IR-24-258 affects multiple Fortinet products including FortiADC, FortiAnalyzer, FortiMail, and FortiWeb among others.

  • What versions are vulnerable to FG-IR-24-258?

    Versions prior to the remediation versions listed in FG-IR-24-258 for each affected Fortinet product are vulnerable.

  • Is a patch available for FG-IR-24-258?

    Yes, patches are available for FG-IR-24-258 as per the recommended upgrades in the advisory.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203