Impact of OpenSSH Vulnerabilities (CVE-2024-6387, CVE-2024-39894 and CVE-2025-26465) on VMware Cloud Director
search cancel

Impact of OpenSSH Vulnerabilities (CVE-2024-6387, CVE-2024-39894 and CVE-2025-26465) on VMware Cloud Director

book

Article ID: 422196

calendar_today

Updated On:

Products

VMware Cloud Director

Issue/Introduction

VMware Cloud Director is impacted by the following vulnerabilities:

  • CVE-2024-6387: An unauthenticated, remote code execution vulnerability found in the OpenSSH server (sshd). This is due to a signal handler race condition that can be triggered when a client fails to authenticate within the LoginGraceTime. It affects OpenSSH server versions starting with 8.5p1 up to, but not including, 9.8p1.

  • CVE-2024-39894

  • CVE-2025-26465

Environment

VMware Cloud Director (VCD) 10.x

Cause

The underlying Photon OS used by VMware Cloud Director contains vulnerable versions of the OpenSSH server component, leading to the security issues identified by the CVEs.

Resolution

To resolve these security vulnerabilities, you must upgrade your VMware Cloud Director instance to the version that includes the patched Photon OS:

  • Upgrade to VMware Cloud Director 10.6.1.2 patch release.

This patch updates the underlying Photon OS to a version that includes a corrected OpenSSH component, thereby addressing the vulnerabilities.

Additional Information

OpenSSH Version Check: You can verify the installed OpenSSH version on your VCD appliance using the command:

rpm -qa | grep -i openssh

  • If OpenSSH 8.9p1-8.ph4 or a later version is installed, no further action related to these specific CVEs is needed.