## https://sploitus.com/exploit?id=5D2CB1F8-DC04-5545-8BC7-29EE3DA8890E
# CVE-2024-6387_Check
<img width="802" alt="image" src="https://github.com/xaitax/CVE-2024-6387_Check/assets/5014849/81d765ec-fe2b-45f9-9535-1b04c925910a">
## ๐ Description
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the recently discovered `regreSSHion` vulnerability (CVE-2024-6387). This script facilitates rapid scanning of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure is secure.
## ๐ Features
- **Rapid Scanning**: Quickly scan multiple IP addresses, domain names, and CIDR ranges for the CVE-2024-6387 vulnerability.
- **Banner Retrieval**: Efficiently retrieves SSH banners without authentication.
- **Multi-threading**: Uses threading for concurrent checks, significantly reducing scan times.
- **Detailed Output**: Provides clear, emoji-coded output summarizing scan results.
- **Port Check**: Identifies closed ports and provides a summary of non-responsive hosts.
## ๐ Usage
```bash
python CVE-2024-6387_Check.py <targets> [--port PORT] [--timeout TIMEOUT] [--list FILE]
```
### Examples
#### Single IP
```bash
python CVE-2024-6387_Check.py 192.168.1.1
```
#### IPs from a file
```bash
python CVE-2024-6387_Check.py -l ip_list.txt
```
#### Multiple IPs and Domains
```bash
python CVE-2024-6387_Check.py 192.168.1.1 example.com 192.168.1.2
```
#### CIDR Range
```bash
python CVE-2024-6387_Check.py 192.168.1.0/24
```
#### With Custom Port
```bash
python CVE-2024-6387_Check.py 192.168.1.1 example.com --port 2222
```
### Output
The script will provide a summary of the scanned targets:
* ๐จ Vulnerable: Servers running a vulnerable version of OpenSSH.
* ๐ก๏ธ Not Vulnerable: Servers running a non-vulnerable version of OpenSSH.
* โ ๏ธ Unknown: Servers running an unknown version of SSH
* ๐ Closed Ports: Count of servers with port 22 (or specified port) closed.
* ๐ Total Scanned: Total number of targets scanned.
```text
๐ก๏ธ Servers not vulnerable: 2
[+] Server at somedomain.cloudapp.azure.com (running SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11)
[+] Server at regresshion_test.cc (running SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.3)
๐จ Servers likely vulnerable: 1
[+] Server at 4.231.170.122 (running SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u2)
โ ๏ธ Servers with unknown SSH version: 1
[+] Server at 103.97.85.85 (banner: SSH-2.0-ROSSSH)
๐ Servers with port 22 closed: 254
๐ Total scanned targets: 257
```
## ๐ References
[Qualys Blog on regreSSHion Vulnerability](https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server)