<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>VyOS - Blog</title>
    <link>https://blog.vyos.io</link>
    <description>VyOS Platform Project news and updates 
All about development and project life in  our blog</description>
    <language>en</language>
    <pubDate>Thu, 24 Oct 2024 09:17:37 GMT</pubDate>
    <dc:date>2024-10-24T09:17:37Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Remote code execution in listening Zabbix agent (CVE-2023-32728)</title>
      <link>https://blog.vyos.io/remote-code-execution-in-listening-zabbix-agent-cve-2023-32728</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/remote-code-execution-in-listening-zabbix-agent-cve-2023-32728" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Remote%20code%20execution%20in%20listening%20Zabbix%20agent%20(CVE-2023-32728).png" alt="zabbix cve" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Our community member Fabian Riechsteiner &lt;a href="https://vyos.dev/T6776"&gt;brought to our attention&lt;/a&gt; that the version of the Zabbix agent present in VyOS 1.4.0 is susceptible to a remote code execution vulnerability — &lt;a href="https://support.zabbix.com/browse/ZBX-23858"&gt;CVE-2023-32728&lt;/a&gt;. We made a hotfix available to subscribers, and the fix will be a part of the upcoming VyOS 1.4.1 release.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/remote-code-execution-in-listening-zabbix-agent-cve-2023-32728" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Remote%20code%20execution%20in%20listening%20Zabbix%20agent%20(CVE-2023-32728).png" alt="zabbix cve" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Our community member Fabian Riechsteiner &lt;a href="https://vyos.dev/T6776"&gt;brought to our attention&lt;/a&gt; that the version of the Zabbix agent present in VyOS 1.4.0 is susceptible to a remote code execution vulnerability — &lt;a href="https://support.zabbix.com/browse/ZBX-23858"&gt;CVE-2023-32728&lt;/a&gt;. We made a hotfix available to subscribers, and the fix will be a part of the upcoming VyOS 1.4.1 release.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fremote-code-execution-in-listening-zabbix-agent-cve-2023-32728&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>1.4</category>
      <category>vulnerability</category>
      <pubDate>Thu, 24 Oct 2024 09:17:37 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/remote-code-execution-in-listening-zabbix-agent-cve-2023-32728</guid>
      <dc:date>2024-10-24T09:17:37Z</dc:date>
    </item>
    <item>
      <title>CVE-2024-6387 (regreSSHion)</title>
      <link>https://blog.vyos.io/cve-2024-6387-regresshion</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2024-6387-regresshion" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/CVE-2024-6387.png" alt="CVE-2024-6387: remote code execution in OpenSSH server" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Today Qualys's security team has disclosed a remotely exploitable vulnerability in OpenSSH server. It was assigned CVE-2024-6387 number and nicknamed "regreSSHion" because its cause is an accidental removal of code that fixed a much earlier vulnerability back in 2006. It affects OpenSSH versions older than 4.4p1 and versions between 8.5p1 and 9.8p1. VyOS 1.3.8 includes OpenSSH 7.9p1 and thus isn't vulnerable. VyOS 1.4.0 includes 9.2p1 and will need a patch to remain secure.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2024-6387-regresshion" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/CVE-2024-6387.png" alt="CVE-2024-6387: remote code execution in OpenSSH server" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Today Qualys's security team has disclosed a remotely exploitable vulnerability in OpenSSH server. It was assigned CVE-2024-6387 number and nicknamed "regreSSHion" because its cause is an accidental removal of code that fixed a much earlier vulnerability back in 2006. It affects OpenSSH versions older than 4.4p1 and versions between 8.5p1 and 9.8p1. VyOS 1.3.8 includes OpenSSH 7.9p1 and thus isn't vulnerable. VyOS 1.4.0 includes 9.2p1 and will need a patch to remain secure.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fcve-2024-6387-regresshion&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>announcement</category>
      <category>vulnerability</category>
      <pubDate>Mon, 01 Jul 2024 10:24:00 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/cve-2024-6387-regresshion</guid>
      <dc:date>2024-07-01T10:24:00Z</dc:date>
    </item>
    <item>
      <title>Zenbleed and OpenSSH agent vulnerabilities and their impact on VyOS</title>
      <link>https://blog.vyos.io/zenbleed-and-the-ssh-agent-vulnerability</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/zenbleed-and-the-ssh-agent-vulnerability" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Zenbleed%20and%20OpenSSH%20agent%20vulnerabilities%20and%20their%20Impact%20on%20VyOS.png" alt="Zenbleed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Recently, two severe vulnerabilities were discovered by security researchers. One of them is nicknamed Zenbleed (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593"&gt;CVE-2023-20593&lt;/a&gt;) and affects a number of AMD CPUs, the other one (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408"&gt;CVE-2023-38408&lt;/a&gt;) affects OpenSSH. Both are potentially very serious but, luckily, don't affect most VyOS users. We will include fixes for them in our next releases, of course, and we can provide hotfix packages to people who need them now.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/zenbleed-and-the-ssh-agent-vulnerability" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Zenbleed%20and%20OpenSSH%20agent%20vulnerabilities%20and%20their%20Impact%20on%20VyOS.png" alt="Zenbleed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Recently, two severe vulnerabilities were discovered by security researchers. One of them is nicknamed Zenbleed (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593"&gt;CVE-2023-20593&lt;/a&gt;) and affects a number of AMD CPUs, the other one (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408"&gt;CVE-2023-38408&lt;/a&gt;) affects OpenSSH. Both are potentially very serious but, luckily, don't affect most VyOS users. We will include fixes for them in our next releases, of course, and we can provide hotfix packages to people who need them now.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fzenbleed-and-the-ssh-agent-vulnerability&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>vyos</category>
      <category>vulnerability</category>
      <pubDate>Thu, 27 Jul 2023 10:16:51 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/zenbleed-and-the-ssh-agent-vulnerability</guid>
      <dc:date>2023-07-27T10:16:51Z</dc:date>
    </item>
    <item>
      <title>Recent OpenSSL vulnerabilities do not affect any VyOS versions</title>
      <link>https://blog.vyos.io/cve-2022-3786-vyos-not-vulnerable</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2022-3786-vyos-not-vulnerable" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Recent%20OpenSSL.png" alt="openssl" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Many people are concerned about recently announced OpenSSL vulnerabilities (&lt;a href="https://cve.circl.lu/cve/CVE-2022-3786"&gt;CVE-2022-3786&lt;/a&gt; and &lt;a href="https://cve.circl.lu/cve/CVE-2022-3602"&gt;CVE-2022-3602&lt;/a&gt;). However, none of the VyOS versions ever released are vulnerable. Those vulnerabilities affect only OpenSSL version &lt;span style="font-weight: bold;"&gt;3.0.x&lt;/span&gt;, while VyOS uses &lt;span style="font-weight: bold;"&gt;1.1.1n&lt;/span&gt; in the 1.3.x LTS line and in the nightly builds of the upcoming 1.4 release,&amp;nbsp; and that version is not vulnerable.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2022-3786-vyos-not-vulnerable" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Recent%20OpenSSL.png" alt="openssl" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Many people are concerned about recently announced OpenSSL vulnerabilities (&lt;a href="https://cve.circl.lu/cve/CVE-2022-3786"&gt;CVE-2022-3786&lt;/a&gt; and &lt;a href="https://cve.circl.lu/cve/CVE-2022-3602"&gt;CVE-2022-3602&lt;/a&gt;). However, none of the VyOS versions ever released are vulnerable. Those vulnerabilities affect only OpenSSL version &lt;span style="font-weight: bold;"&gt;3.0.x&lt;/span&gt;, while VyOS uses &lt;span style="font-weight: bold;"&gt;1.1.1n&lt;/span&gt; in the 1.3.x LTS line and in the nightly builds of the upcoming 1.4 release,&amp;nbsp; and that version is not vulnerable.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fcve-2022-3786-vyos-not-vulnerable&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>vyos</category>
      <category>openssl</category>
      <category>vulnerability</category>
      <pubDate>Thu, 03 Nov 2022 13:50:29 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/cve-2022-3786-vyos-not-vulnerable</guid>
      <dc:date>2022-11-03T13:50:29Z</dc:date>
    </item>
  </channel>
</rss>
