CVE-2024-39894Time-of-check Time-of-use (TOCTOU) Race Condition in Openssh

Severity
7.5HIGHNVD
EPSS
2.9%
top 13.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 2
Latest updateJan 29

Description

OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages1 packages

Debianopenbsd/openssh< 1:9.8p1-1+1

🔴Vulnerability Details

3
CVEList
CVE-2024-39894: OpenSSH 92024-07-02
GHSA
GHSA-g5qj-pfmg-p3jp: OpenSSH 92024-07-02
OSV
CVE-2024-39894: OpenSSH 92024-07-02

📋Vendor Advisories

6
BSD
FreeBSD-SA-25:01.openssh: OpenSSH Keystroke Obfuscation Bypass2025-01-29
Apple
CVE-2024-39894: macOS Sequoia 152024-09-16
Microsoft
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g. for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly other timing attac2024-07-09
Ubuntu
OpenSSH vulnerability2024-07-09
Red Hat
openssh: Logic error in ObscureKeystrokeTiming2024-07-02
CVE-2024-39894 — Openbsd Openssh vulnerability | cvebase