Skip to content

CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH.

Notifications You must be signed in to change notification settings

RickGeex/CVE-2024-6387-Checker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-6387-Checker

Description

CVE-2024-6387-Checker is a tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the recently discovered regreSSHion vulnerability (CVE-2024-6387). This script facilitates rapid scanning of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure is secure.

Features

  • Rapid Scanning: Quickly scan multiple IP addresses, domain names, and CIDR ranges for the CVE-2024-6387 vulnerability.
  • Banner Retrieval: Efficiently retrieves SSH banners without authentication.
  • Multi-threading: Uses threading for concurrent checks, significantly reducing scan times.
  • Detailed Output: Provides clear, emoji-coded output summarizing scan results.
  • Port Check: Identifies closed ports and provides a summary of non-responsive hosts.

Usage

python CVE-2024-6387.py <targets> [--port PORT]

Examples

Single IP

python CVE-2024-6387.py 192.168.1.1

IPs from a list

python CVE-2024-6387.py -l ip_list.txt

Multiple IPs and Domains

python CVE-2024-6387.py 192.168.1.1 example.com 192.168.1.2

CIDR Range

python CVE-2024-6387.py 192.168.1.0/24

With Custom Port

python CVE-2024-6387.py 192.168.1.1 example.com --port 2222

References

Qualys Blog on regreSSHion Vulnerability Qualys TXT on regreSSHion Vulnerability

About

CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages