CVE-2024-6387

ENISA EUVD: EUVD-2024-47981 ↗
✓ Confirmed 0-Day
Triaged: March 5, 2026 6 articles Published: 2024-07-01

EPSS Score

Source: FIRST.org · 2026-05-23
58.12%
probability
This CVE has a 58.12% probability of being exploited in the next 30 days.
0% Top 98.2th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.1
HIGH
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

Affected Products

8.5p1
Red Hat
Red Hat Enterprise Linux 9
0:8.7p1-38.el9_4.1
Red Hat
Red Hat Enterprise Linux 9
0:8.7p1-38.el9_4.1
Red Hat
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
0:8.7p1-12.el9_0.1
Red Hat
Red Hat Enterprise Linux 9.2 Extended Update Support
0:8.7p1-30.el9_2.4

Exploits & PoC

xaitax/CVE-2024-6387_Check

CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH

523 2025-06-02
zgzhang/cve-2024-6387-poc

a signal handler race condition in OpenSSH's server (sshd)

494 2024-07-01
acrono/cve-2024-6387-poc

32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc

382 2024-07-01
Karmakstylez/CVE-2024-6387

Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)

179 2024-08-22
lflare/cve-2024-6387-poc

MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc

126 2024-07-25
l0n3m4n/CVE-2024-6387

PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit)

103 2024-07-05
filipi86/CVE-2024-6387-Vulnerability-Checker

This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The

101 2024-07-10
xonoxitron/regreSSHion

CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.

66 2024-07-02
d0rb/CVE-2024-6387

This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.

49 2024-07-04
bigb0x/CVE-2024-6387

Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.

35 2024-07-06
getdrive/CVE-2024-6387-PoC

PoC RCE in OpenSSH

25 2024-07-01
sxlmnwb/CVE-2024-6387

Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.

20 2024-07-03
TAM-K592/CVE-2024-6387

Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (

14 2024-07-02
14 2024-07-02
devarshishimpi/CVE-2024-6387-Check

Fast, efficient, and reliable detection for the regreSSHion exploit. Scan multiple targets in seconds with zero dependencies.

13 2024-07-08
AiGptCode/ssh_exploiter_CVE-2024-6387

CVE-2024-6387 with auto ip scanner and auto expliot

11 2024-07-04
l-urk/CVE-2024-6387

Proof of concept python script for regreSSHion exploit.

11 2024-10-19
xonoxitron/regreSSHion-checker

Quickly identifies servers vulnerable to OpenSSH 'regreSSHion' (CVE-2024-6387).

10 2024-07-02
0x4D31/cve-2024-6387_hassh

HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion).

10 2024-07-05
P4x1s/CVE-2024-6387

SSH RCE PoC CVE-2024-6387

8 2024-07-02
wiggels/regresshion-check

CLI Tool to Check SSH Servers for Vulnerability to CVE-2024-6387

6 2024-07-16
azurejoga/CVE-2024-6387-how-to-fix

Vulnerability remediation and mitigationCVE-2024-6387

6 2024-07-05
4 2024-07-02
th3gokul/CVE-2024-6387

CVE-2024-6387 : Vulnerability Detection tool for regreSSHion Remote Unauthenticated Code Execution in OpenSSH Server

4 2024-07-02
harshinsecurity/sentinelssh

SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerabi

4 2024-07-08
kinu404/CVE-2024-6387

This is an altered PoC for d0rb/CVE-2024-6387. This takes glibc addresses and trys to exploit the CVE through them.

4 2025-01-20
PrincipalAnthony/CVE-2024-6387-Updated-x64bit

Private x64 RCE exploit for CVE-2024-6387 [02.07.2024] from exploit.in

3 2024-07-02
sardine-web/CVE-2024-6387-template

Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387

3 2024-07-06
awusan125/test_for6387

test code for cve-2024-6387

3 2024-12-22
betancour/OpenSSH-Vulnerability-test

OpenSSH CVE-2024-6387 Vulnerability Checker

2 2024-07-02
Symbolexe/CVE-2024-6387

SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems

2 2024-07-04
sardine-web/CVE-2024-6387_Check

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signa

2 2024-07-04
Ap0dexMe0/CVE-2024-6387

OpenSSH RCE Massive Vulnerable Scanner

2 2024-07-15
identity-threat-labs/CVE-2024-6387-Vulnerability-Checker

This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The

2 2024-08-29
anhvutuan/CVE-2024-6387-poc-1

CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is

2 2024-07-11
OHHDamnBRO/Noregressh

CVE-2024-6387 and more Checker and Exploiter - Reverse/Bind-Shell Support.

2 2025-09-24
7etsuo/cve-2024-6387-poc

a signal handler race condition in OpenSSH's server (sshd)

1 2024-07-01
teamos-hub/regreSSHion

This is a POC I wrote for CVE-2024-6387

1 2024-07-02
R4Tw1z/CVE-2024-6387

This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool le

1 2024-07-02
shamo0/CVE-2024-6387_PoC

Script for checking CVE-2024-6387 (regreSSHion)

1 2024-07-02
rumochnaya/openssh-cve-2024-6387.sh

openssh-cve-2024-6387.sh

1 2024-07-02
xristos8574/regreSSHion-nmap-scanner

A bash script for nmap to scan for vulnerable machines in regards to the latest CVE-2024-6387

1 2024-07-02
n1cks0n/Test_CVE-2024-6387

Test_CVE-2024-6387 is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH

1 2024-07-02
RickGeex/CVE-2024-6387-Checker

CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH.

1 2024-07-02
grupooruss/CVE-2024-6387

regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script

1 2024-07-02
turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker

Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH

1 2024-07-04
redux-sibi-jose/mitigate_ssh

OpenSSH vulnerability CVE-2024-6387

1 2024-07-11
alex14324/ssh_poc2024

An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server

1 2024-07-31
X-Projetion/CVE-2023-4596-OpenSSH-Multi-Checker

CVE-2024-6387-checker is a tool or script designed to detect the security vulnerability known as CVE-2024-6387 OpenSSH. CVE-2024-6387 OpenSSH is an en

1 2024-08-06
identity-threat-labs/Article-RegreSSHion-CVE-2024-6387

In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administra

1 2024-08-29
xiw1ll/CVE-2024-6387_Checker

Nuclei template to detect CVE-2024-6387. All latest patched versions are excluded.

1 2025-07-24
FerasAlrimali/CVE-2024-6387-POC

SSHd cve-2024-6387-poc

0 2024-07-01
CiderAndWhisky/regression-scanner

Used to detect ssh servers vulnerable to CVE-2024-6387. Shameless robbery from https://github.com/bigb0x/CVE-2024-6387 using ChatGPT to translate the

0 2024-07-02
daniel-odrinski/CVE-2024-6387-Mitigation-Ansible-Playbook

An Ansible Playbook to mitigate the risk of RCE (CVE-2024-6387) until platforms update OpenSSH to a non-vulnerable version.

0 2024-07-02
zenzue/CVE-2024-6387-Mitigation

Mitigation Guide for CVE-2024-6387 in OpenSSH

0 2024-07-02
hssmo/cve-2024-6387_AImade

cve-2024-6387_AImade

0 2024-07-02
particle99/CVE-2024-6387-POC

fork for proof of concept of the regresshion vulnerability

0 2024-07-02
no-one-sec/CVE-2024-6387

开箱即用的AK47

0 2024-07-02
JackSparrowhk/ssh-CVE-2024-6387-poc

CVE-2024-6387_Check 是一款轻量级、高效的工具,旨在识别运行易受攻击的 OpenSSH 版本的服务器,专门针对最近发现的regreSSHion漏洞 (CVE-2024-6387)。此脚本有助于快速扫描多个 IP 地址、域名和 CIDR 网络范围,以检测潜在漏洞并确保您的基础设施安全

0 2024-07-04
invaderslabs/regreSSHion-CVE-2024-6387-

Provides instructions for using the script to check if your OpenSSH installation is vulnerable to CVE-2024-6387

0 2024-07-04
4lxprime/regreSSHive

rewrited SSH Exploit for CVE-2024-6387 (regreSSHion)

0 2024-07-04
vkaushik-chef/regreSSHion

Chef Inspec profile for checking regreSSHion vulnerability CVE-2024-6387

0 2024-07-08
mrmtwoj/CVE-2024-6387

regreSSHion is a security tool designed to test for vulnerabilities related to CVE-2024-6387, specifically focusing on SSH and remote access exploitat

0 2024-07-09
kubota/CVE-2024-6387-Vulnerability-Checker

This Rust Code is designed to check SSH servers for the CVE-2024-6387 vulnerability

0 2024-07-09
dream434/CVE-2024-6387

OpenSSH a publié un avis de sécurité concernant la vulnérabilité critique CVE-2024-6387. Cette vulnérabilité permet à un attaquant non authentifié d'

0 2025-02-22
almogopp/OpenSSH-CVE-2024-6387-Fix

A Bash script to mitigate the CVE-2024-6387 vulnerability in OpenSSH by providing an option to upgrade to a secure version or apply a temporary workar

0 2024-08-20
HadesNull123/CVE-2024-6387_Check

RCE OpenSSH CVE-2024-6387 Check and Exploit

0 2024-08-26
0 2025-09-08
Remnant-DB/CVE-2024-6387

OpenSSH regreSSHion (CVE-2024-6387) Lab

0 2026-03-09
Doux-x/CVE-2024-6387-analysis

CVE-2024-6387 OpenSSH 信号竞争漏洞(regreSSHion)分析报告及检测脚本

0 2026-03-30
vuducmanhno100-cloud/CVE-2024-6387

CVE-2024-6387 POC (Currently being edited)

0 2026-05-22
95 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
85%
EPSS 58.12%
CVSS v3.1 8.1
Mentions 6
Last Seen Jul 09, 2024

CNA Information

CNA Assigner
redhat
CNA Title
Openssh: regresshion - race condition in ssh allows rce/dos

Analyst Note

CVE-2024-6387 is the OpenSSH regreSSHion vulnerability (CVE-2024-6387), a critical remote code execution flaw. CERT-EU and CERT-FR security advisories from July 2024 confirm active exploitation in the wild. The vulnerability was exploited before and concurrent with patch availability, meeting zero-day criteria. Strong institutional validation from EU cybersecurity authorities supports confirmation despite limited article excerpt detail.

Threat Actors 2

Mana Team
apt_group 🇨🇳 CN
Dark Partners
apt_group

Triage Info

Decided atMar 05, 2026
Published DateJul 01, 2024