HomeSonicwallCVE-2024-6387

CVE-2024-6387

HIGH
8.1CVSS
Published: 2024-07-01
Updated: 2025-09-30
AI Analysis

Description

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-364CWE-362

Metadata

Primary Vendor
SONICWALL
Published
7/1/2024
Last Modified
9/30/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sonicwall : sma_6200_firmwaresonicwall : sma_7200_firmwarearista : eoscanonical : ubuntu_linuxcanonical : ubuntu_linuxalmalinux : almalinuxsonicwall : sma_6210_firmwaresonicwall : sma_7210_firmwaresonicwall : sma_8200v_firmwaresonicwall : sra_ex_7000_firmwarenetapp : a1k_firmwarenetapp : a70_firmwarenetapp : a90_firmwarenetapp : a700s_firmwarenetapp : 8300_firmwarenetapp : 8700_firmwarenetapp : a400_firmwarenetapp : c400_firmwarenetapp : a250_firmwarenetapp : 500f_firmwarenetapp : c250_firmwarenetapp : a800_firmwarenetapp : c800_firmwarenetapp : a900_firmwarenetapp : a9500_firmwarenetapp : c190_firmwarenetapp : a150_firmwarenetapp : a220_firmwarenetapp : fas2720_firmwarenetapp : fas2750_firmwarenetapp : fas2820_firmwarenetapp : bootstrap_osapple : macosapple : macosapple : macosopenbsd : opensshopenbsd : opensshopenbsd : opensshopenbsd : opensshopenbsd : opensshredhat : openshift_container_platformredhat : enterprise_linuxredhat : enterprise_linux_eusredhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_ibm_z_systemsredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_server_aussuse : linux_enterprise_microdebian : debian_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxamazon : amazon_linuxnetapp : active_iq_unified_managernetapp : e-series_santricity_os_controllernetapp : ontapnetapp : ontap_select_deploy_administration_utilitynetapp : ontap_toolsnetapp : ontap_toolsfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdnetbsd : netbsd

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-6387 | HIGH Severity | CVEDatabase.com | CVEDatabase.com