{"id":100986,"date":"2024-07-02T23:10:58","date_gmt":"2024-07-03T06:10:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=100986"},"modified":"2024-12-20T11:06:48","modified_gmt":"2024-12-20T19:06:48","slug":"does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/","title":{"rendered":"Does the &#8220;regreSSHion&#8221; vulnerability impact Macs? How to disable Remote Login"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-101020\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p><em>A high-severity vulnerability called regreSSHion impacts OpenSSH, and may affect Macs. Here&#8217;s everything Mac users should know.<\/em><\/p>\n<p>On Monday, July 1, the maintainers of OpenSSH, an open-source software package, released a major security update. OpenSSH is built into many operating systems, including macOS\u2014the operating system that powers Apple&#8217;s Mac computers.<\/p>\n<p>The July 1 update, OpenSSH 9.8p1, patches a single vulnerability: &#8220;regreSSHion,&#8221; aka CVE-2024-6387. How might this vulnerability affect Macs? Should Mac users be concerned? What can be done about it? Let&#8217;s explore those answers.<\/p>\n<p><strong>Update:<\/strong> <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sonoma-14-6-ios-17-6-and-more-with-security-updates\/\">Apple later patched this vulnerability on July 29, in macOS Sonoma 14.6<\/a>.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#openssh\">What is OpenSSH? How do Macs use it?<\/a><\/li>\n<li><a href=\"#regresshion\">What is the &#8220;regreSSHion&#8221; vulnerability (CVE-2024-6387)?<\/a><\/li>\n<li><a href=\"#version\">What version of OpenSSH is built into macOS? Is it vulnerable?<\/a><\/li>\n<li><a href=\"#apple\">What does Apple have to say about regreSSHion?<\/a><\/li>\n<li><a href=\"#remotelogin\">How can I disable Remote Login on macOS if I don&#8217;t use it?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"openssh\"><\/a><\/li>\n<\/ul>\n<h3>What is OpenSSH? How do Macs use it?<\/h3>\n<p>OpenSSH is mainly used to establish a secure connection between a computer and a remote server. It is commonly associated with the command-line tool &#8220;ssh&#8221; (short for &#8220;secure shell&#8221;) which can be used in the Mac&#8217;s Terminal app.<\/p>\n<p>Macs have a feature (which can be enabled in System Settings, under General &gt; Sharing) called <strong>Remote Login<\/strong>; it is off by default. If a user enables the feature, &#8220;Remote Login lets users of other computers access this computer using SSH and SFTP,&#8221; according to Apple. Anyone on the same network can then attempt to connect to your Mac silently via SSH. Behind the scenes, Remote Login uses the open-source software OpenSSH.<\/p>\n<p>If you set up port forwarding on your home router or company firewall, then SSH can even be made accessible to any computer on the Internet. One company <a href=\"https:\/\/unit42.paloaltonetworks.com\/threat-brief-cve-2024-6387-openssh\/\" target=\"_blank\" rel=\"noopener nofollow\">observed<\/a> more than 7 million vulnerable OpenSSH servers connected to the Internet on July 1, the day of the disclosure and patch.<a name=\"regresshion\"><\/a><\/p>\n<h3>What is the &#8220;regreSSHion&#8221; vulnerability (CVE-2024-6387)?<\/h3>\n<p>Qualys, the company that discovered the vulnerability, <a href=\"https:\/\/www.qualys.com\/regresshion-cve-2024-6387\/\" target=\"_blank\" rel=\"noopener nofollow\">describes<\/a> it as follows:<\/p>\n<blockquote><p>regreSSHion, CVE-2024-6387, is an unauthenticated remote code execution [(RCE) vulnerability] in OpenSSH\u2019s server (sshd) that grants full root access. It affects the default configuration and does not require user interaction. It poses a significant exploit risk.<\/p><\/blockquote>\n<p>The <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-6387\" target=\"_blank\" rel=\"noopener\">summary<\/a> from NIST&#8217;s National Vulnerability Database adds some additional detail:<\/p>\n<blockquote><p>A security regression (CVE-2006-5051) was discovered in OpenSSH&#8217;s server (sshd). There is a race condition which can lead [&#8230;] sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.<\/p><\/blockquote>\n<p>NIST gives this vulnerability an 8.1 (out of 10) CVSS score, which is considered &#8220;high&#8221; severity.<\/p>\n<p>The name &#8220;regreSSHion&#8221; is a pun based on SSH and the programming term &#8220;regression&#8221; (in this case, referring to the reintroduction of a past security bug).<a name=\"version\"><\/a><\/p>\n<h3>What version of OpenSSH is built into macOS? Is it vulnerable?<\/h3>\n<p>As of macOS Sonoma 14.5, Macs include OpenSSH version 9.6p1, which is an affected version; the only fully patched version is 9.8p1 (or 9.8). You can check your own Mac&#8217;s OpenSSH version via the Terminal:<\/p>\n<pre>% \/usr\/bin\/ssh -V\r\nOpenSSH_9.6p1, LibreSSL 3.3.6<\/pre>\n<p>(Note that macOS Sonoma currently also includes an outdated and highly vulnerable version of LibreSSL that is more than two years old. We have been <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/\">covering this<\/a> on The Mac Security Blog since last year, soon after macOS Sonoma&#8217;s public release. Apple has continued to ignore our inquiries about it.)<\/p>\n<p>While the particular version of OpenSSH built into Macs is known to be vulnerable, attackers can only exploit the regreSSHion vulnerability under specific conditions. Qualys only <a href=\"https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/2024\/07\/01\/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server\" target=\"_blank\" rel=\"noopener nofollow\">notes<\/a> that the vulnerability &#8220;likely&#8221; exists in macOS. However, Qualys stated that it did not investigate macOS specifically, and that the exploitability of the bug on macOS &#8220;remains uncertain.&#8221;<a name=\"apple\"><\/a><\/p>\n<h3>What does Apple have to say about regreSSHion?<\/h3>\n<p>Publicly, Apple has remained quiet about whether macOS is affected.<\/p>\n<p>Apple did not respond to Intego&#8217;s inquiry about the vulnerability. It is unclear whether Apple has done any internal testing related to regreSSHion, or whether (and when) the company plans to release a security patch.<\/p>\n<p>Reportedly, customers who contacted AppleCare Enterprise Support Engineering got a generic response: &#8220;To protect our customers, Apple does not disclose, discuss or confirm security issues until a full investigation has occurred and any necessary patches or releases are available.&#8221;<a name=\"remotelogin\"><\/a><\/p>\n<h3>How can I disable Remote Login on macOS if I don&#8217;t use it?<\/h3>\n<p>Apple&#8217;s &#8220;Remote Login&#8221; feature, which enables remote SSH access to a Mac, is disabled by default. You can easily check whether it&#8217;s enabled on your Mac.<\/p>\n<p>If you don&#8217;t use Remote Login but you find that it&#8217;s enabled on your Mac, it&#8217;s probably a good idea to disable it. This will help reduce your attack surface, i.e. the potential ways in which you could potentially be attacked.<\/p>\n<p>If you use macOS Ventura, macOS Sonoma, or macOS Sequoia beta:<\/p>\n<ol>\n<li>Click on the Apple menu in the top-left corner of the screen, then click System Settings\u2026<\/li>\n<li>Click on General, then click on Sharing.<\/li>\n<li>In the Advanced section, make sure that the toggle switch (slider) next to Remote Login is in the off position (i.e. the circle is on the left).<\/li>\n<\/ol>\n<p>If you use macOS Monterey or earlier, please note that your Mac&#8217;s operating system contains <a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-mac-become-unsafe-to-use\/\">numerous vulnerabilities that will never be patched<\/a>. Apple provides only minimal security patches for the two previous versions of macOS, and zero patches for versions older than that. However, if your Mac doesn&#8217;t officially support macOS Sonoma (and if you&#8217;re unwilling to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">upgrade macOS using an unsupported method<\/a>), you can disable Remote Login as follows:<\/p>\n<ol>\n<li>Click on the Apple menu in the top-left corner of the screen, then click System Preferences\u2026<\/li>\n<li>Click on Sharing.<\/li>\n<li>On the left side of the window, make sure that the checkbox next to Remote Login is unchecked.<\/li>\n<\/ol>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3 id=\"exploremore\">How can I learn more?<\/h3>\n<p>To learn more about the regreSSHion vulnerability, you can read Qualys&#8217;s <a href=\"https:\/\/www.qualys.com\/regresshion-cve-2024-6387\/\" target=\"_blank\" rel=\"noopener nofollow\">overview<\/a>, <a href=\"https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/2024\/07\/01\/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server\" target=\"_blank\" rel=\"noopener nofollow\">blog post and FAQ<\/a>, and <a href=\"https:\/\/www.qualys.com\/2024\/07\/01\/cve-2024-6387\/regresshion.txt\" target=\"_blank\" rel=\"noopener nofollow\">technical advisory<\/a>.<\/p>\n<p>We briefly discussed regreSSHion on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-iphone-chips-macos-sequoia-features-and-the-regresshion-vulnerability-intego-mac-podcast-episode-351\/\">episode 351<\/a>\u00a0of the Intego Mac Podcast.<\/p>\n<p><iframe style=\"width: 100%; max-width: 660px; overflow: hidden; border-radius: 10px;\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/episode-351-new-iphone-chips-macos-sequoia-features\/id1293834627?i=1000661119243\" height=\"175\" frameborder=\"0\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security, and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A high-severity vulnerability called regreSSHion impacts OpenSSH, and may affect Macs. Here&#8217;s everything Mac users should know about CVE-2024-6387.<\/p>\n","protected":false},"author":14,"featured_media":101018,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A high-severity vulnerability called regreSSHion impacts OpenSSH, and may affect Macs. Here&#039;s everything Mac users should know about CVE-2024-6387.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does the &quot;regreSSHion&quot; vulnerability impact Macs? How to disable Remote Login - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A high-severity vulnerability called regreSSHion impacts OpenSSH, and may affect Macs. Here&#039;s everything Mac users should know about CVE-2024-6387.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-03T06:10:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-20T19:06:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Qualys regreSSHion vulnerability logo OpenSSH SSH CVE-2024-6387 CVE-2006-5051 RCE regression\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/\",\"name\":\"Does the \\\"regreSSHion\\\" vulnerability impact Macs? How to disable Remote Login - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#primaryimage\"},\"datePublished\":\"2024-07-03T06:10:58+00:00\",\"dateModified\":\"2024-12-20T19:06:48+00:00\",\"description\":\"A high-severity vulnerability called regreSSHion impacts OpenSSH, and may affect Macs. Here's everything Mac users should know about CVE-2024-6387.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Does the &#8220;regreSSHion&#8221; vulnerability impact Macs? How to disable Remote Login\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Does the &#8220;regreSSHion&#8221; vulnerability impact Macs? How to disable Remote Login\",\"datePublished\":\"2024-07-03T06:10:58+00:00\",\"dateModified\":\"2024-12-20T19:06:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#webpage\"},\"wordCount\":1093,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg\",\"keywords\":[\"Vulnerabilities\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A high-severity vulnerability called regreSSHion impacts OpenSSH, and may affect Macs. Here's everything Mac users should know about CVE-2024-6387.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/","og_locale":"en_US","og_type":"article","og_title":"Does the \"regreSSHion\" vulnerability impact Macs? How to disable Remote Login - The Mac Security Blog","og_description":"A high-severity vulnerability called regreSSHion impacts OpenSSH, and may affect Macs. Here's everything Mac users should know about CVE-2024-6387.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-07-03T06:10:58+00:00","article_modified_time":"2024-12-20T19:06:48+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg","width":400,"height":260,"caption":"Qualys regreSSHion vulnerability logo OpenSSH SSH CVE-2024-6387 CVE-2006-5051 RCE regression"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/","name":"Does the \"regreSSHion\" vulnerability impact Macs? How to disable Remote Login - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#primaryimage"},"datePublished":"2024-07-03T06:10:58+00:00","dateModified":"2024-12-20T19:06:48+00:00","description":"A high-severity vulnerability called regreSSHion impacts OpenSSH, and may affect Macs. Here's everything Mac users should know about CVE-2024-6387.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Does the &#8220;regreSSHion&#8221; vulnerability impact Macs? How to disable Remote Login"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Does the &#8220;regreSSHion&#8221; vulnerability impact Macs? How to disable Remote Login","datePublished":"2024-07-03T06:10:58+00:00","dateModified":"2024-12-20T19:06:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#webpage"},"wordCount":1093,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg","keywords":["Vulnerabilities"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/does-the-regresshion-vulnerability-impact-macs-how-to-disable-remote-login\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Qualys-regreSSHion-logo-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qgO","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100986"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=100986"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100986\/revisions"}],"predecessor-version":[{"id":102608,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100986\/revisions\/102608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/101018"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=100986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=100986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=100986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}