CVE-2025-8277
BaseFortify
Publication date: 2025-09-09
Last updated on: 2026-05-06
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| libssh | libssh | * |
| mbedtls | mbedtls | * |
| libgcrypt | libgcrypt | * |
| openssl | openssl | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a memory leak triggered by an authenticated client repeatedly sending incorrect key exchange guesses to libssh. Detection would involve monitoring client-side memory usage for abnormal increases during SSH sessions using libssh versions 0.6.0 and later. Network detection could focus on identifying repeated rekeying attempts with incorrect first_kex_packet_follows parameters from authenticated clients. However, no specific detection commands are provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating libssh to a version later than 0.6.0 where this memory leak issue is fixed. Additionally, restricting or monitoring authenticated client rekey attempts to prevent repeated incorrect KEX guesses can reduce exploitation risk. Since the vulnerability affects client-side memory, ensuring clients use patched versions and limiting exposure to untrusted servers or clients is advisable. [1]
How can this vulnerability impact me? :
The vulnerability can cause client-side application instability and availability issues by exhausting system memory through repeated incorrect key exchange attempts. This can lead to crashes or denial-of-service conditions on the client side, especially when using cryptographic backends like libgcrypt. [1]
Can you explain this vulnerability to me?
This vulnerability is a memory exhaustion issue in the libssh library's key exchange (KEX) process. When an authenticated client repeatedly sends incorrect guesses during rekeying attempts, libssh fails to free previously allocated memory for ephemeral key pairs. This causes a memory leak that gradually consumes system memory, potentially leading to client-side crashes and denial-of-service conditions. [1]