Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    CVE-2024-7589

    Scheduled Pinned Locked Moved pfSense Packages
    6 Posts 2 Posters 466 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • sokeadaS
      sokeada
      last edited by

      Hope system patch will release soon, I really appreciate your work.

      60b51012-065b-4aac-b8a1-ac851d845574-image.png

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @sokeada
        last edited by

        @sokeada

        The good news is :

        According to what is said here : https://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.html

        In cases where sshd(8) cannot be updated, the race condition issue can be resolved by setting LoginGraceTime to 0 in /etc/ssh/sshd_config and restarting sshd(8). While this change makes the daemon vulnerable to a denial-of-service, it safeguards it against remote code execution.

        And guess what : check your pfSense /etc/ssh/sshd_config and see that :

        LoginGraceTime 0s
        

        Keep in mind that on pfSense sshguard is still guarding the SSH access, so any denial-of-service attempst will quickly end up hitting the firewall.
        SSH is normally only accessible on a trusted LAN (LAN or some OPTx interface) and that nobody (pfSense) has SSH open on the WAN anyway.
        So, me back to bed for the time being.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        sokeadaS 2 Replies Last reply Reply Quote 0
        • sokeadaS
          sokeada @Gertjan
          last edited by

          @Gertjan thanks for the tip and quick respond, let me find out and follow your suggestion. 😊

          1 Reply Last reply Reply Quote 0
          • sokeadaS
            sokeada @Gertjan
            last edited by

            @Gertjan said in CVE-2024-7589:

            LoginGraceTime 0s

            Im my pfSense 2.7.2 default sshd_config is set LoginGraceTime to 0s already so no need to do anything, right?

            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @sokeada
              last edited by

              @sokeada

              Right.

              Just double check that only 'you' can access the SSH port, by allowing it using firewall rules on the interfaces you don't SSH to be accessed, if you have multiple LANs. And/or add a firewall on your trusted LAN so only your device (your IP - using port 22 TCP) can use SSH.
              Or even : shut down SSH when you don't need it, as you can enable it with a click in the GUI.

              Btw : be ware : I'm not a security guy. I'm just applying common sense.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              sokeadaS 1 Reply Last reply Reply Quote 0
              • sokeadaS
                sokeada @Gertjan
                last edited by

                @Gertjan your instruction is make sense to me. I already applied that too except turn on/off ssh via GUI when needed. That's another tip. Thanks you so much.

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.