CVE-2025-46806: CWE-823: Use of Out-of-range Pointer Offset in https://github.com/yrutschle/sslh/releases/tag/v2.2.4 sslh
A Use of Out-of-range Pointer Offset vulnerability in sslh leads to denial of service on some architectures.This issue affects sslh before 2.2.4.
AI Analysis
Technical Summary
CVE-2025-46806 is a vulnerability classified under CWE-823, which involves the use of an out-of-range pointer offset in the sslh software before version 2.2.4. sslh is a protocol multiplexer that allows multiple protocols to share a single port, commonly used to multiplex SSH, HTTPS, OpenVPN, and other protocols on port 443. The vulnerability arises from improper pointer arithmetic or bounds checking, leading to the possibility of accessing memory outside the intended buffer boundaries. This can cause a denial of service (DoS) condition on affected systems, particularly on certain architectures where memory layout or pointer handling is more sensitive to such errors. The vulnerability does not require authentication, user interaction, or privileges to exploit, and can be triggered remotely by sending crafted network traffic to the sslh service. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with network attack vector, low attack complexity, no privileges or user interaction required, and a limited impact on availability (denial of service). No known exploits are currently reported in the wild, and no patch links are provided in the source data, but version 2.2.4 of sslh is indicated as the fixed version. The vulnerability affects all versions prior to 2.2.4, though exact affected versions are unspecified. The root cause is a pointer offset calculation error that leads to out-of-bounds memory access, which can crash the sslh process and disrupt service availability.
Potential Impact
For European organizations, the primary impact of CVE-2025-46806 is the potential for denial of service attacks against systems running vulnerable versions of sslh. Since sslh is often deployed in environments where multiple protocols are multiplexed on a single port (commonly port 443), disruption can affect critical services such as SSH access, HTTPS web services, or VPN connections. This could lead to temporary loss of remote administrative access or interruption of secure communications, impacting business continuity and operational security. Organizations relying on sslh in perimeter or internal network gateways may experience service outages, which could be exploited as part of a broader attack strategy or to cause operational disruption. The vulnerability does not directly compromise confidentiality or integrity but can degrade availability, which is critical for many European enterprises, especially those in finance, healthcare, and critical infrastructure sectors. The lack of authentication or user interaction requirements increases the risk of automated exploitation attempts, although no exploits are currently known. The impact is more pronounced in environments with high reliance on sslh for protocol multiplexing and where rapid recovery from service disruption is challenging.
Mitigation Recommendations
European organizations should prioritize upgrading sslh to version 2.2.4 or later, where the vulnerability is addressed. In the absence of an immediate upgrade path, organizations can implement network-level mitigations such as filtering or rate limiting incoming traffic to the sslh service to reduce exposure to crafted packets that trigger the out-of-range pointer offset. Monitoring sslh service logs and network traffic for anomalies or crashes can help detect attempted exploitation. Employing redundancy and failover mechanisms for services behind sslh can minimize operational impact during potential DoS events. Additionally, organizations should review their use of sslh and consider alternative multiplexing solutions with a stronger security track record if timely patching is not feasible. Regular vulnerability scanning and asset inventory updates should include sslh to ensure timely detection of vulnerable instances. Finally, coordinating with upstream vendors or open-source maintainers for patches and advisories is recommended to stay informed about any emerging exploits or fixes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-46806: CWE-823: Use of Out-of-range Pointer Offset in https://github.com/yrutschle/sslh/releases/tag/v2.2.4 sslh
Description
A Use of Out-of-range Pointer Offset vulnerability in sslh leads to denial of service on some architectures.This issue affects sslh before 2.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-46806 is a vulnerability classified under CWE-823, which involves the use of an out-of-range pointer offset in the sslh software before version 2.2.4. sslh is a protocol multiplexer that allows multiple protocols to share a single port, commonly used to multiplex SSH, HTTPS, OpenVPN, and other protocols on port 443. The vulnerability arises from improper pointer arithmetic or bounds checking, leading to the possibility of accessing memory outside the intended buffer boundaries. This can cause a denial of service (DoS) condition on affected systems, particularly on certain architectures where memory layout or pointer handling is more sensitive to such errors. The vulnerability does not require authentication, user interaction, or privileges to exploit, and can be triggered remotely by sending crafted network traffic to the sslh service. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with network attack vector, low attack complexity, no privileges or user interaction required, and a limited impact on availability (denial of service). No known exploits are currently reported in the wild, and no patch links are provided in the source data, but version 2.2.4 of sslh is indicated as the fixed version. The vulnerability affects all versions prior to 2.2.4, though exact affected versions are unspecified. The root cause is a pointer offset calculation error that leads to out-of-bounds memory access, which can crash the sslh process and disrupt service availability.
Potential Impact
For European organizations, the primary impact of CVE-2025-46806 is the potential for denial of service attacks against systems running vulnerable versions of sslh. Since sslh is often deployed in environments where multiple protocols are multiplexed on a single port (commonly port 443), disruption can affect critical services such as SSH access, HTTPS web services, or VPN connections. This could lead to temporary loss of remote administrative access or interruption of secure communications, impacting business continuity and operational security. Organizations relying on sslh in perimeter or internal network gateways may experience service outages, which could be exploited as part of a broader attack strategy or to cause operational disruption. The vulnerability does not directly compromise confidentiality or integrity but can degrade availability, which is critical for many European enterprises, especially those in finance, healthcare, and critical infrastructure sectors. The lack of authentication or user interaction requirements increases the risk of automated exploitation attempts, although no exploits are currently known. The impact is more pronounced in environments with high reliance on sslh for protocol multiplexing and where rapid recovery from service disruption is challenging.
Mitigation Recommendations
European organizations should prioritize upgrading sslh to version 2.2.4 or later, where the vulnerability is addressed. In the absence of an immediate upgrade path, organizations can implement network-level mitigations such as filtering or rate limiting incoming traffic to the sslh service to reduce exposure to crafted packets that trigger the out-of-range pointer offset. Monitoring sslh service logs and network traffic for anomalies or crashes can help detect attempted exploitation. Employing redundancy and failover mechanisms for services behind sslh can minimize operational impact during potential DoS events. Additionally, organizations should review their use of sslh and consider alternative multiplexing solutions with a stronger security track record if timely patching is not feasible. Regular vulnerability scanning and asset inventory updates should include sslh to ensure timely detection of vulnerable instances. Finally, coordinating with upstream vendors or open-source maintainers for patches and advisories is recommended to stay informed about any emerging exploits or fixes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- suse
- Date Reserved
- 2025-04-30T11:28:04.728Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683d9907182aa0cae2439cdb
Added to database: 6/2/2025, 12:28:55 PM
Last enriched: 7/11/2025, 8:03:02 AM
Last updated: 8/18/2025, 1:33:42 AM
Views: 19
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.