CVE-2024-6387 Vulnerability Checker

Jul 11, 2024

Overview

This Python script is designed to check SSH servers for the CVE-2024-6387 vulnerability, specifically targeting the recently discovered regreSSHion, which is associated with specific versions of OpenSSH. The tool supports multiple IP addresses, URLs, CIDR ranges, and ports, and can also read addresses from a file. The results are displayed in a categorized and color-coded manner for better readability.

Features

  • Customizable:
    Specify multiple IP addresses, URLs, CIDR ranges, and ports.
  • File Input Support:
    Read addresses and ranges from a file.
  • Color-Coded Output:
    Easily distinguish between vulnerable, safe, unknown, and error results.
  • Network Range Handling:
    Automatically expands CIDR ranges into individual IP addresses.

Output

  • SAFE:
    Non-vulnerable servers.
  • VULNERABLE:
    Servers running a vulnerable version of OpenSSH.
  • UNKNOWN:
    Servers with an unknown SSH version.
  • ERROR:
    Servers that could not be accessed or resolved.

Command Line

To run the script with multiple IPs, URLs, or CIDR ranges directly from the command line:

python3 CVE-2024-6387-Vulnerability-Checker.py <addresses> -p <ports> -t <timeout> Code language: HTML, XML 










Author

Filipi Pires
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Filipi Pires
3 months ago

For those of you that dont know where to get the checker, you can clone it here.
https://github.com/filipi86/CVE-2024-6387-Vulnerability-Checker/

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023