Skip to main content

CVE-2024-0723: CWE-404 Denial of Service in freeSSHd

Medium
VulnerabilityCVE-2024-0723cvecve-2024-0723cwe-404
Published: Fri Jan 19 2024 (01/19/2024, 16:31:04 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: freeSSHd

Description

A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251547.

AI-Powered Analysis

AILast updated: 07/08/2025, 16:42:28 UTC

Technical Analysis

CVE-2024-0723 is a vulnerability identified in freeSSHd version 1.0.9, a Windows-based SSH server application. The vulnerability is classified under CWE-404, which corresponds to an improper resource shutdown or release issue. This flaw allows an unauthenticated remote attacker to trigger a denial of service (DoS) condition by manipulating an unspecified component of the freeSSHd service. The vulnerability can be exploited remotely without requiring any user interaction or privileges, making it accessible to any attacker with network access to the affected server. The impact of exploitation is limited to availability, as the vulnerability does not affect confidentiality or integrity. The CVSS v3.1 base score is 5.3 (medium severity), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, indicating network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability. No patches or fixes have been disclosed yet, and no known exploits are reported in the wild at this time. The vulnerability disclosure date is January 19, 2024. Given freeSSHd's role as an SSH server, successful exploitation could disrupt remote administrative access or automated processes relying on SSH connectivity, potentially causing operational downtime or service interruptions.

Potential Impact

For European organizations, the primary impact of CVE-2024-0723 is the potential disruption of critical services relying on freeSSHd for secure remote access. Organizations using freeSSHd 1.0.9 on Windows servers may experience denial of service conditions, leading to loss of availability of SSH services. This could affect IT operations, remote management, and automated deployment or monitoring systems. While the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects, especially in sectors requiring high uptime such as finance, healthcare, and critical infrastructure. The medium severity rating suggests that while the risk is not critical, it should not be ignored, particularly in environments where freeSSHd is exposed to untrusted networks. European organizations with legacy or niche deployments of freeSSHd are at risk of operational disruption, which could translate into financial losses or compliance issues if service level agreements are breached.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately assess and inventory all Windows servers running freeSSHd version 1.0.9 to identify exposed instances. 2) Restrict network access to freeSSHd services using firewall rules or network segmentation to limit exposure to trusted IP addresses only, reducing the attack surface. 3) Consider disabling freeSSHd temporarily on non-critical systems until a patch or update is available. 4) Where possible, replace freeSSHd with alternative, actively maintained SSH server software that is not affected by this vulnerability. 5) Monitor network traffic and system logs for unusual connection attempts or service disruptions indicative of exploitation attempts. 6) Prepare incident response plans to quickly restore service availability in case of a DoS attack. 7) Stay informed on vendor updates or community patches addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-19T09:53:29.542Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b435b1

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 4:42:28 PM

Last updated: 8/17/2025, 7:56:55 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats