CVE-2025-5372

| EUVD-2025-19931 MEDIUM
2025-07-04 [email protected]
5.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 16, 2026 - 02:42 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 02:42 euvd
EUVD-2025-19931
CVE Published
Jul 04, 2025 - 06:15 nvd
MEDIUM 5.0

Description

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success-the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

Analysis

A security vulnerability in libssh (CVSS 5.0). Remediation should follow standard vulnerability management procedures.

Technical Context

Vulnerability type not specified by vendor. Affects libssh.

Affected Products

['libssh']

Remediation

Monitor vendor channels for patch availability.

Priority Score

25
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +25
POC: 0

Vendor Status

Ubuntu

Priority: Medium
libssh
Release Status Version
jammy released 0.9.6-2ubuntu0.22.04.4
noble released 0.10.6-2ubuntu0.1
oracular released 0.10.6-3ubuntu1.1
plucky released 0.11.1-1ubuntu0.1
upstream released 0.11.2
xenial ignored changes too intrusive
bionic ignored changes too intrusive
focal ignored changes too intrusive

Debian

Bug #1108407
libssh
Release Status Fixed Version Urgency
bullseye fixed 0.9.8-0+deb11u2 -
bullseye (security) fixed 0.9.8-0+deb11u2 -
bookworm fixed 0.10.6-0+deb12u2 -
bookworm (security) vulnerable 0.10.6-0+deb12u1 -
trixie fixed 0.11.2-1+deb13u1 -
forky fixed 0.11.3-1 -
sid fixed 0.12.0-1 -
(unstable) fixed 0.11.2-1 -

Share

CVE-2025-5372 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy