Share
## https://sploitus.com/exploit?id=AA539633-36A9-53BC-97E8-19BC0E4E8D37
# CVE-2024-6387

## ๐Ÿ“œ Description

CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the recently discovered `regreSSHion` vulnerability (CVE-2024-6387). This script facilitates rapid scanning of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure is secure.

## ๐ŸŒŸ Features

- **Rapid Scanning**: Quickly scan multiple IP addresses, domain names, and CIDR ranges for the CVE-2024-6387 vulnerability.
- **Banner Retrieval**: Efficiently retrieves SSH banners without authentication.
- **Multi-threading**: Uses threading for concurrent checks, significantly reducing scan times.
- **Detailed Output**: Provides clear, emoji-coded output summarizing scan results.
- **Port Check**: Identifies closed ports and provides a summary of non-responsive hosts.

## ๐Ÿš€ Usage

```bash
python CVE-2024-6387_Check.py <targets> [--port PORT]
```

### Examples

#### Single IP

```bash
python CVE-2024-6387_Check.py 192.168.1.1
```

#### IPs from a list

```bash
python CVE-2024-6387_Check.py -l ip_list.txt
```

#### Multiple IPs and Domains

```bash
python CVE-2024-6387_Check.py 192.168.1.1 example.com 192.168.1.2
```

#### CIDR Range

```bash
python CVE-2024-6387_Check.py 192.168.1.0/24
```

#### With Custom Port

```bash
python CVE-2024-6387_Check.py 192.168.1.1 example.com --port 2222
```

### Output

The script will provide a summary of the scanned targets:

* ๐Ÿšจ Vulnerable: Servers running a vulnerable version of OpenSSH.
* ๐Ÿ›ก๏ธ Not Vulnerable: Servers running a non-vulnerable version of OpenSSH.
* ๐Ÿ”’ Closed Ports: Count of servers with port 22 (or specified port) closed.
* ๐Ÿ“Š Total Scanned: Total number of targets scanned.

```text
๐Ÿ›ก๏ธ Servers not vulnerable: 1

   [+] Server at 157.90.125.31 (running SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11)

๐Ÿšจ Servers likely vulnerable: 2

   [+] Server at 4.231.170.121 (running SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.10)
   [+] Server at 4.231.170.122 (running SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u2)

๐Ÿ”’ Servers with port 22 closed: 254

๐Ÿ“Š Total scanned targets: 257
```

## ๐Ÿ“š References
[Qualys Blog on regreSSHion Vulnerability](https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server)