CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for successthe function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
redhatCNA
5 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
Debian logo
Debian Releases
Debian Product
Codename
libssh
bullseye (security)
vulnerable
bullseye
postponed
bookworm
no-dsa
bookworm (security)
vulnerable
forky
0.11.2-1
fixed
sid
0.11.2-1
fixed
trixie
0.11.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libssh
plucky
Fixed 0.11.1-1ubuntu0.1
released
oracular
Fixed 0.10.6-3ubuntu1.1
released
noble
Fixed 0.10.6-2ubuntu0.1
released
jammy
Fixed 0.9.6-2ubuntu0.22.04.4
released
focal
needs-triage
bionic
needs-triage
xenial
needs-triage