An exploit developed by GitHub user YassDEV221608 targets a significant vulnerability in the OpenSSH protocol, posing a significant threat to users relying on it for secure communication. The flaw is a race condition within OpenSSH’s server daemon, specifically if a client does not authenticate within the required LoginGraceTime, and has been confirmed not to affect OpenBSD systems. It allows attackers to gain unauthorized root access by executing code.

HSCC CWG urges halting NPRM, calls for joint cybersecurity policy reform to boost healthcare resilience
The Cybersecurity Working Group (CWG) within the U.S. Healthcare and Public Health Sector Coordinating Council (HSCC) has called on the country’s federal administration to work