CVE-2025-5372

EUVD-2025-19931
A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
redhatCNA
5 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 19%
Affected Products (NVD)
VendorProductVersion
libsshlibssh
𝑥
< 0.11.2
redhatopenshift_container_platform
4.0
redhatenterprise_linux
6.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
redhatenterprise_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libssh
bookworm
0.10.6-0+deb12u2
fixed
bookworm (security)
vulnerable
bullseye
vulnerable
bullseye (security)
0.9.8-0+deb11u2
fixed
forky
0.11.3-1
fixed
sid
0.11.3-1
fixed
trixie
0.11.2-1+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libssh
bionic
ignored
focal
ignored
jammy
Fixed 0.9.6-2ubuntu0.22.04.4
released
noble
Fixed 0.10.6-2ubuntu0.1
released
oracular
Fixed 0.10.6-3ubuntu1.1
released
plucky
Fixed 0.11.1-1ubuntu0.1
released
xenial
ignored