Session Handling Vulnerability in OVH's Bastion for SSH Access Management
CVE-2025-59339

4.4MEDIUM

Key Information:

Vendor

Ovh

Vendor
CVE Published:
17 September 2025

What is CVE-2025-59339?

The Bastion tool by OVH is responsible for managing SSH accesses with capabilities such as authentication, authorization, and audit logging. It includes a session recording feature, which generates ttyrec files. However, a flaw exists in the handling of these files when utilizing the osh-encrypt-rsync script. While the script is designed to rotate and encrypt session files using specified GPG keys, it fails to sign these files, compromising the integrity of the session recordings. This oversight could potentially lead to unauthorized manipulation of recorded sessions, making it critical for users to reassess their security configurations and ensure proper access control measures are in place.

Affected Version(s)

the-bastion < 3.22.00

References

CVSS V3.1

Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-59339 : Session Handling Vulnerability in OVH's Bastion for SSH Access Management