A critical vulnerability, tracked as CVE-2023-38408, has been discovered in OpenSSH’s ssh-agent, specifically affecting the agent’s forwarding feature. This vulnerability allows for remote code execution (RCE), potentially enabling attackers to execute arbitrary commands on a vulnerable system. At least 700,000 OpenSSH servers are known to be at risk.
“This vulnerability, if exploited, could lead to full system compromise where an attacker can execute arbitrary code with the highest privileges, resulting in complete system takeover, installation of malware, data manipulation and the creation of backdoors for persistent access.” – Bharat Jogi, Senior Director, Threat Research Unit, Qualys.
Security Now Podcast discussion by Steve Gibson on the OpenSSH vulnerability
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
A Practical Brief for vCISOs THE WARNING WE IGNORED OR COULD NOT UNDERSTAND For years, the most credible...
Read more
A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...
Read more
Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
