CRZ-007

OpenSSH 8.7 public — vulnerable to regreSSHion (CVE-2024-6387)

high CVSS 3.1: 8.1 · Asset: corezoid-ma.dev.corezoid.com:22

Summary

corezoid-ma.dev.corezoid.com exposes SSH on port 22 to the public internet with banner SSH-2.0-OpenSSH_8.7. OpenSSH 8.7 was released 2021-08-20 — nearly 4.5 years ago. It is vulnerable to:

Additionally: exposing SSH on a dev host to the whole internet is a hardening anti-pattern regardless of version. Dev hosts often have weak creds, shared keys, or outdated sudoers configs.

Reproduction

$ nc -w 5 corezoid-ma.dev.corezoid.com 22
SSH-2.0-OpenSSH_8.7

Additional recon (pending, non-destructive)

PoC

Not executed. regreSSHion is:

Running the PoC would violate the non-destructive RoE. Version disclosure is sufficient evidence.

Impact

If the host is glibc Linux and unpatched:

Remediation

Priority 1 — now:

  1. Block SSH from the public internet. Move sshd to listen only on the VPC / VPN CIDR. SSH on a public IP is never appropriate for a dev host.
  2. Upgrade OpenSSH to ≥ 9.8p1 (which fixed regreSSHion).
  3. Put the host behind the corporate VPN (it's already running at vpn.corezoid.com) or AWS SSM Session Manager.

Priority 2 — hardening:

  1. Audit /etc/ssh/sshd_config: PasswordAuthentication no, PermitRootLogin no, key-only auth, limit users via AllowUsers.
  2. Install fail2ban or equivalent.
  3. Rotate any SSH authorized_keys that allowed access to this host.
  4. Audit all other *.dev.corezoid.com and *.pre.corezoid.com for similar SSH exposure.

References