Dell Unity: Is Unity affected by CVE-2024-6409 Vulnerability (User Correctable)
Summary: This article details the susceptibility of Dell Unity to the vulnerabilities detailed in CVE-2024-6409.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
Information on whether or not Dell Unity is vulnerable to CVE-2024-6409.
Cause
A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.
Resolution
Unity should not be impacted as the mentioned CVE only impacts Openssh version above 8.7 and the current Unity OE version 5.4 runs Openssh 7.6.
Affected Products
Dell EMC Unity, Dell EMC Unity Family |Dell EMC Unity All Flash, Dell EMC Unity Hybrid, Dell EMC UnityVSA Professional Edition/Unity Cloud EditionArticle Properties
Article Number: 000254342
Article Type: Solution
Last Modified: 17 Oct 2025
Version: 2
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.