Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-5372


A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.


Published

2025-07-04T06:15:24.930

Last Modified

2025-07-08T16:18:53.607

Status

Undergoing Analysis

Source

[email protected]

Severity

CVSSv3.1: 5.0 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-682

Affected Vendors & Products

-


References