Skip to main content

RegreSSHion attack on R5 SSH.

CVE CVE-2024-6387
Advisory Summary A Remote Unauthenticated Code Execution (RCE) vulnerability in the OpenSSH server running on Linux-based systems was discovered and verified on a 32-bit Intel-based CPU. Albeit our recorders use a different CPU, the vulnerability is potentially applicable also for these CPUs and is classified as high regardless of any HW platform. An upgrade of the OpenSSH server is recommended.
Products or Components 8000 NVRs, 9000 NVRs, RideSafe GT/MT/RT NVRs
Addressed in Release Patch 42339 R1.0 for 5.26.0.0047 (GA) and 5.27.0.0049 (GA)
Severity High
Ticket SV-139

Description

A Remote Unauthenticated Code Execution (RCE) vulnerability in the OpenSSH server running on Linux-based systems was discovered and verified on a 32-bit Intel-based CPU. Albeit our recorders use a different CPU, the vulnerability is potentially applicable also for these CPUs and is classified as high regardless of any HW platform. An upgrade of the OpenSSH server is recommended.

Impact

The main impact is a potential unauthenticated remote code execution (more information here).

Solution

Update R5 recorders using either 5.26.0.0047 (GA) or 5.27.0.0049 (GA) with the 42339 R1.0 patch. Future releases of R5 will not be affected by the issues.

Don’t apply the 42114 R1.0 patch released for the DHeat attack on top of this patch since it will revert its files to a previous version. The 42339 R1.0 patch also covers everything that was covered by the 42114 R1.0 patch.

For older releases, limit the usage of the provisioning interface only when necessary and only in a trusted environment, and consider disabling the provisioning interface by contacting our technical support.

In case R5 recorders are managed under Command Enterprise, please remind customers that 2.17 is the minimum version that supports R5 recorders at 5.26.0.0047 (GA), and 2.19 is the minimum version that supports R5 recorders at 5.27.0.0049 (GA).

Revision

September 6, 2024 – Initial public report

Disclaimer

March Networks’ assessment of this security vulnerability is contingent on the March Networks products being updated to the recommended release and/or security patch level and the system being deployed and configured in accordance with March Networks security recommendations and industry best practices. IT IS THE CUSTOMER’S RESPONSIBILITY TO EVALUATE THE EFFECT OF ANY SECURITY VULNERABILITY. A failure to update March Networks products and/or to follow March Networks recommendations or industry best practices may increase the risk associated with a security vulnerability. March Networks follows industry-leading practices in addressing security vulnerabilities in our products. While March Networks cannot guarantee that our products will be free from security vulnerabilities, we are committed to providing updates and security fixes for our supported products if and when a high-security vulnerability is determined to affect March Networks products.

Sign up for our newsletter here Get the latest news and information on our IP video products with March Networks News. Subscribe now
Return to top