CVE-2024-54855

6.4 MEDIUM

📋 TL;DR

Vanilla OS 2 Core image v1.1.0 contains static SSH keys, enabling attackers to perform man-in-the-middle attacks during SSH connections. This vulnerability affects all systems running this specific version of Vanilla OS Core image, potentially compromising SSH session integrity and confidentiality.

💻 Affected Systems

Products:
  • Vanilla OS 2 Core image
Versions: v1.1.0
Operating Systems: Vanilla OS 2
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific Core image version; other Vanilla OS components or versions may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept and decrypt all SSH traffic, steal credentials, execute arbitrary commands on connected systems, and maintain persistent access to compromised infrastructure.

🟠

Likely Case

Attackers intercept SSH sessions in controlled network environments, capture sensitive data, and potentially gain unauthorized access to systems using stolen credentials.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential session interception within the same network segment, with detection possible through SSH key validation failures.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept SSH traffic; static keys make man-in-the-middle attacks straightforward for attackers with network positioning.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.1.1 or later

Vendor Advisory: https://github.com/Vanilla-OS/core-image/security/advisories/GHSA-67pc-hqr2-g34h

Restart Required: Yes

Instructions:

1. Update Vanilla OS Core image to v1.1.1 or later. 2. Regenerate SSH host keys on affected systems. 3. Restart SSH service. 4. Update known_hosts files on client systems.

🔧 Temporary Workarounds

Regenerate SSH host keys

linux

Manually regenerate unique SSH host keys to replace static vulnerable keys

sudo rm /etc/ssh/ssh_host_*
sudo dpkg-reconfigure openssh-server
sudo systemctl restart ssh

Disable SSH service

linux

Temporarily disable SSH if not required

sudo systemctl stop ssh
sudo systemctl disable ssh

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Deploy SSH certificate-based authentication instead of key-based authentication

🔍 How to Verify

Check if Vulnerable:

Check if SSH host keys match known static keys from v1.1.0 by comparing fingerprints with known vulnerable key fingerprints

Check Version:

cat /etc/os-release | grep VERSION_ID

Verify Fix Applied:

Verify SSH host keys have been regenerated by checking key fingerprints differ from known static keys and match newly generated unique keys

📡 Detection & Monitoring

Log Indicators:

  • SSH key warnings in auth.log
  • Multiple SSH connection failures with key validation errors
  • Unexpected SSH host key changes

Network Indicators:

  • Unusual SSH traffic patterns
  • SSH connections to unexpected destinations
  • SSH protocol anomalies

SIEM Query:

source="auth.log" AND "ssh" AND ("WARNING" OR "error") AND "key"

🔗 References

📤 Share & Export