Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11625: CWE-287 Improper Authentication in wolfSSL wolfSSH

0
Critical
VulnerabilityCVE-2025-11625cvecve-2025-11625cwe-287
Published: Tue Oct 21 2025 (10/21/2025, 13:25:18 UTC)
Source: CVE Database V5
Vendor/Project: wolfSSL
Product: wolfSSH

Description

Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier clients that allows authentication bypass and leaking of clients credentials.

AI-Powered Analysis

AILast updated: 01/06/2026, 18:05:32 UTC

Technical Analysis

CVE-2025-11625 is a vulnerability classified under CWE-287 (Improper Authentication) affecting wolfSSH, a secure shell client component of the wolfSSL embedded SSL/TLS library. The vulnerability exists in wolfSSH versions 1.4.20 and earlier, where improper host authentication allows an attacker to bypass normal authentication mechanisms. This flaw enables attackers to impersonate legitimate hosts or intercept and leak client credentials during the SSH handshake process. The vulnerability does not require any prior privileges or authentication and can be triggered remotely over the network, making it highly exploitable. The CVSS v4.0 score of 9.4 reflects its critical severity, with attack vector being network-based, low attack complexity, no privileges required, but user interaction is needed. The impact covers confidentiality, integrity, and availability, as attackers can gain unauthorized access, manipulate data, or disrupt communications. wolfSSH is commonly used in embedded systems, IoT devices, and industrial control systems due to its lightweight footprint, increasing the risk to critical infrastructure and devices with limited update capabilities. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity warrant immediate attention from users and vendors. The absence of a patch link suggests that a fix is pending or in development, emphasizing the need for proactive mitigation.

Potential Impact

For European organizations, the impact of CVE-2025-11625 is significant, especially those relying on embedded systems, IoT devices, or industrial control systems that incorporate wolfSSH for secure communications. Successful exploitation can lead to unauthorized access to sensitive systems, leakage of client credentials, and potential lateral movement within networks. This can compromise critical infrastructure sectors such as energy, manufacturing, transportation, and telecommunications, which increasingly depend on embedded secure communications. The breach of confidentiality and integrity could result in data theft, operational disruption, and loss of trust. Additionally, availability may be affected if attackers disrupt SSH sessions or manipulate device configurations. The critical severity and ease of exploitation elevate the risk profile for European entities, particularly those with limited patch management capabilities or legacy systems. The potential for espionage, sabotage, or ransomware deployment following initial access increases the threat landscape complexity.

Mitigation Recommendations

1. Immediate identification and inventory of all wolfSSH client deployments within the organization, focusing on versions 1.4.20 and earlier. 2. Monitor vendor communications closely for official patches or updates addressing CVE-2025-11625 and prioritize rapid deployment once available. 3. Implement network segmentation to isolate devices running vulnerable wolfSSH clients, limiting exposure to untrusted networks. 4. Employ strict SSH client and server authentication policies, including multi-factor authentication and certificate-based authentication where possible, to reduce reliance on vulnerable host authentication mechanisms. 5. Enhance network monitoring and intrusion detection systems to detect anomalous SSH handshake behaviors or credential leakage attempts. 6. Where patching is delayed, consider temporary mitigations such as disabling wolfSSH clients or replacing them with alternative SSH clients not affected by this vulnerability. 7. Conduct security awareness training for users to recognize suspicious SSH prompts or connection anomalies that may indicate exploitation attempts. 8. Review and harden device configurations and firmware to minimize attack surface and ensure secure boot and update mechanisms are in place.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wolfSSL
Date Reserved
2025-10-10T21:06:46.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d4b63a7c70f178f7611fd

Added to database: 1/6/2026, 5:50:27 PM

Last enriched: 1/6/2026, 6:05:32 PM

Last updated: 1/8/2026, 4:28:32 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats