Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47913: CWE-703: Improper Handling of Exceptional Conditions in golang.org/x/crypto golang.org/x/crypto/ssh/agent

0
High
VulnerabilityCVE-2025-47913cvecve-2025-47913cwe-703
Published: Thu Nov 13 2025 (11/13/2025, 21:29:39 UTC)
Source: CVE Database V5
Vendor/Project: golang.org/x/crypto
Product: golang.org/x/crypto/ssh/agent

Description

CVE-2025-47913 is a high-severity vulnerability in the golang. org/x/crypto SSH agent package where SSH clients panic and terminate unexpectedly upon receiving an SSH_AGENT_SUCCESS message when a typed response is expected. This improper handling of exceptional conditions (CWE-703) leads to denial of service by crashing the client process without requiring authentication or user interaction. The vulnerability affects all versions of the golang. org/x/crypto/ssh/agent package and has a CVSS score of 7. 5, indicating significant impact on availability. No known exploits are currently reported in the wild. European organizations using Go-based SSH clients that rely on this package may face service disruptions, particularly in critical infrastructure and development environments. Mitigation involves updating to patched versions once available and implementing robust error handling around SSH agent responses. Countries with strong software development sectors and critical infrastructure relying on Go are most at risk, including Germany, France, the UK, and the Netherlands.

AI-Powered Analysis

AILast updated: 12/23/2025, 17:23:56 UTC

Technical Analysis

CVE-2025-47913 is a vulnerability classified under CWE-703 (Improper Handling of Exceptional Conditions) found in the golang.org/x/crypto/ssh/agent package, a widely used Go library for SSH agent communication. The flaw occurs when an SSH client receives an SSH_AGENT_SUCCESS message while expecting a typed response; instead of handling this gracefully, the client panics and terminates prematurely. This behavior results from inadequate validation and error handling in the SSH agent client code, causing a denial-of-service (DoS) condition by crashing the client process. The vulnerability affects all versions of the package as indicated, with no patches currently available. The CVSS 3.1 score of 7.5 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but a high impact on availability (A:H). Although no known exploits are reported in the wild, the vulnerability could be exploited remotely by an attacker capable of injecting or manipulating SSH agent responses, causing client crashes and disrupting automated or manual SSH operations. This is particularly critical in environments relying on Go-based SSH clients for secure communications and automation.

Potential Impact

For European organizations, the primary impact is denial of service through unexpected termination of SSH client processes, which can disrupt secure shell sessions, automated deployment pipelines, and remote management tasks. This can lead to operational downtime, loss of productivity, and potential delays in critical infrastructure management or software development workflows. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely; however, availability disruptions can have cascading effects, especially in sectors like finance, telecommunications, energy, and government services that rely heavily on SSH for secure remote access. The lack of required privileges or user interaction means attackers can exploit this vulnerability remotely and silently, increasing the risk of widespread disruption. Organizations using Go-based tooling or custom SSH clients embedding this package are particularly vulnerable. The absence of known exploits provides a window for proactive mitigation but also means attackers may develop exploits in the future.

Mitigation Recommendations

Organizations should monitor for official patches or updates from the golang.org/x/crypto project and apply them promptly once available. In the interim, developers should implement additional error handling around SSH agent responses to catch unexpected message types and prevent client panics. Employing SSH client wrappers or middleware that validate and sanitize agent responses can reduce risk. Network-level controls to restrict or monitor SSH agent communication may help detect anomalous messages indicative of exploitation attempts. Additionally, organizations should audit their Go-based SSH client usage to identify affected versions and consider temporary workarounds such as disabling SSH agent forwarding where feasible. Incorporating robust logging and alerting on SSH client crashes will aid in early detection of exploitation attempts. Finally, educating development and operations teams about this vulnerability ensures preparedness for patch deployment and incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-05-13T23:31:29.597Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69164f1005b975ba758cef31

Added to database: 11/13/2025, 9:35:12 PM

Last enriched: 12/23/2025, 5:23:56 PM

Last updated: 12/29/2025, 2:42:38 AM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats