CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for successthe function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
redhatCNA
5 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
VendorProductVersion
libsshlibssh
𝑥
< 0.11.2
redhatopenshift_container_platform
4.0
redhatenterprise_linux
6.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
redhatenterprise_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libssh
bullseye (security)
vulnerable
bullseye
postponed
bookworm
no-dsa
bookworm (security)
vulnerable
trixie
0.11.2-1
fixed
forky
0.11.3-1
fixed
sid
0.11.3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libssh
plucky
Fixed 0.11.1-1ubuntu0.1
released
oracular
Fixed 0.10.6-3ubuntu1.1
released
noble
Fixed 0.10.6-2ubuntu0.1
released
jammy
Fixed 0.9.6-2ubuntu0.22.04.4
released
focal
ignored
bionic
ignored
xenial
ignored