๐Ÿ” CVE Alert

CVE-2025-8114

MEDIUM 4.7

Libssh: null pointer dereference in libssh kex session id calculation

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.

CWE CWE-476
Published Jul 24, 2025
Last Updated Jan 22, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-8114 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2383220 git.libssh.org: https://git.libssh.org/projects/libssh.git/commit/?id=53ac23ded4cb2c5463f6c4cd1525331bd578812d git.libssh.org: https://git.libssh.org/projects/libssh.git/commit/?id=65f363c9 libssh.org: https://www.libssh.org/security/advisories/CVE-2025-8114.txt

Credits

Red Hat would like to thank Jakub Jelen and Philippe Antoine for reporting this issue.