Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cybersecurity»Remote Command Injection Risk via New OpenSSH Flaw: Linux Systems Warned

    Remote Command Injection Risk via New OpenSSH Flaw: Linux Systems Warned

    By NotesleuNo Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    A now-resolved vulnerability in OpenSSH was discovered that could potentially be exploited to execute arbitrary commands remotely on vulnerable hosts under specific circumstances, details of which have surfaced recently.

    “The detected vulnerability could possibly enable a remote attacker to execute arbitrary commands on OpenSSH’s vulnerable forwarded ssh-agent,” Saeed Abbasi, the manager of vulnerability research at Qualys, stated in an analysis last week.

    Identified as CVE-2023-38408, the vulnerability impacts all versions of OpenSSH preceding 9.3p2. As of now, there is no CVSS score attached to this vulnerability.

    OpenSSH, a widely-used tool for remote login employing the SSH protocol, encrypts all traffic to prevent eavesdropping, connection hijacking, and other forms of cyberattacks.

    The successful exploitation of this vulnerability hinges on the presence of specific libraries on the compromised system and the forwarding of the SSH authentication agent to an attacker-controlled system. The SSH agent, a background program, stores user keys in memory and simplifies remote server logins by eliminating the need to re-enter passphrases.

    Qualys explained that upon examining the source code of the ssh-agent, they noticed that a remote attacker with access to the remote server (where the victim’s ssh-agent has been forwarded) can load and immediately unload any shared library in /usr/lib* on the victim’s workstation, via the forwarded ssh-agent. This is possible if the ssh-agent is compiled with ENABLE_PKCS11, which is the default setting.

    A successful proof-of-concept (PoC) against default installations of Ubuntu Desktop 22.04 and 21.10 was executed by the cybersecurity firm. It is anticipated that other Linux distributions could also be vulnerable.

    OpenSSH users are urged to promptly update to the latest version as a protective measure against potential cybersecurity threats.

    This revelation follows a sequence of updates released by OpenSSH maintainers this year to address vulnerabilities. In February, an update was issued to fix a medium-severity security flaw (CVE-2023-25136, CVSS score: 6.5) that could be potentially manipulated by an unauthenticated remote attacker to modify unexpected memory locations and possibly achieve code execution. Another update in March remediated a separate security problem that could be leveraged via a uniquely crafted DNS response to perform an out-of-bounds read of adjacent stack data, leading to a denial-of-service to the SSH client.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 58
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleComplete HTML Handwritten Notes
    Next Article Stanford Researchers Pioneer Locally Conditioned Diffusion for Enhanced Text-to-3D Scene Generation

    Related Posts

    Cyber Attacks December 26, 2025

    Cybersecurity Experts Uncover ToddyCat’s Expanded Arsenal of Data Theft Tools

    December 26, 2025
    Cyber Attacks December 26, 2025

    IBM Report Reveals Data Breach Costs Surge to $4.45 Million in 2023

    December 26, 2025
    Cybersecurity January 22, 2024

    FTC Enforces Strict Measures Against InMarket for Unauthorized Sale of Precise User Location Data

    January 22, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.