Логотип exploitDog
bind:"CVE-2025-5372"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-5372"

Количество 11

Количество 11

ubuntu логотип

CVE-2025-5372

около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
EPSS: Низкий
redhat логотип

CVE-2025-5372

около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2025-5372

около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
EPSS: Низкий
msrc логотип

CVE-2025-5372

18 дней назад

CVSS3: 5
EPSS: Низкий
debian логотип

CVE-2025-5372

около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older ...

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-59w5-j22f-h3rv

около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
EPSS: Низкий
fstec логотип

BDU:2025-07644

3 месяца назад

Уязвимость функции ssh_kdf() библиотеки libssh, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02281-1

24 дня назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02279-1

24 дня назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02278-1

24 дня назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02229-1

около 1 месяца назад

Security update for libssh

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
0%
Низкий
около 1 месяца назад
redhat логотип
CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
0%
Низкий
около 1 месяца назад
msrc логотип
CVSS3: 5
0%
Низкий
18 дней назад
debian логотип
CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older ...

CVSS3: 5
0%
Низкий
около 1 месяца назад
github логотип
GHSA-59w5-j22f-h3rv

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-07644

Уязвимость функции ssh_kdf() библиотеки libssh, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5
0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02281-1

Security update for libssh

24 дня назад
suse-cvrf логотип
SUSE-SU-2025:02279-1

Security update for libssh

24 дня назад
suse-cvrf логотип
SUSE-SU-2025:02278-1

Security update for libssh

24 дня назад
suse-cvrf логотип
SUSE-SU-2025:02229-1

Security update for libssh

около 1 месяца назад

Уязвимостей на страницу