Key Derivation Flaw in libssh with OpenSSL Leading to Cryptographic Risks
CVE-2025-5372
Key Information:
- Vendor
Libssh
- Status
- Vendor
- CVE Published:
- 4 July 2025
What is CVE-2025-5372?
A critical issue has been identified in libssh versions that incorporate OpenSSL versions earlier than 3.0. The vulnerability resides in the ssh_kdf() function, which is responsible for deriving cryptographic keys. There is a disparity in how return values are interpreted between OpenSSL and libssh; OpenSSL uses a return value of 0 to indicate failure, whereas libssh treats 0 as a success. This erroneous interpretation can lead to successful completion of key derivation even when it actually fails, ultimately resulting in the use of uninitialized cryptographic key buffers in further SSH communications. Such exploitation can jeopardize the confidentiality, integrity, and availability of SSH sessions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
libssh 0 < 0.11.2
Red Hat Enterprise Linux 8 0:0.9.6-16.el8_10
Red Hat Enterprise Linux 8 0:0.9.6-16.el8_10
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
