CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2025-5372 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2369388 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

22 Aug 2025, 14:01

Type Values Removed Values Added
First Time Redhat
Libssh libssh
Redhat enterprise Linux
Redhat openshift Container Platform
Libssh
References () https://access.redhat.com/security/cve/CVE-2025-5372 - () https://access.redhat.com/security/cve/CVE-2025-5372 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2369388 - () https://bugzilla.redhat.com/show_bug.cgi?id=2369388 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

08 Jul 2025, 16:18

Type Values Removed Values Added
Summary
  • (es) Se encontró una falla en las versiones de libssh compiladas con versiones de OpenSSL anteriores a la 3.0, específicamente en la función ssh_kdf(), responsable de la derivación de claves. Debido a la interpretación inconsistente de los valores de retorno, donde OpenSSL usa 0 para indicar un fallo y libssh usa 0 para éxito, la función puede devolver erróneamente un estado de éxito incluso cuando la derivación de claves falla. Esto provoca que se utilicen búferes de claves criptográficas sin inicializar en comunicaciones posteriores, lo que podría comprometer la confidencialidad, integridad y disponibilidad de las sesiones SSH.

04 Jul 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-04 06:15

Updated : 2025-08-22 14:01


NVD link : CVE-2025-5372

Mitre link : CVE-2025-5372

CVE.ORG link : CVE-2025-5372


JSON object : View

Products Affected

libssh

  • libssh

redhat

  • enterprise_linux
  • openshift_container_platform
CWE
CWE-682

Incorrect Calculation