Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47914: CWE-237 in golang.org/x/crypto golang.org/x/crypto/ssh/agent

0
Medium
VulnerabilityCVE-2025-47914cvecve-2025-47914cwe-237
Published: Wed Nov 19 2025 (11/19/2025, 20:33:43 UTC)
Source: CVE Database V5
Vendor/Project: golang.org/x/crypto
Product: golang.org/x/crypto/ssh/agent

Description

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

AI-Powered Analysis

AILast updated: 11/19/2025, 20:44:19 UTC

Technical Analysis

CVE-2025-47914 is a security vulnerability identified in the golang.org/x/crypto SSH agent package, specifically within the message handling logic for new identity requests. The root cause is the lack of validation on the size of incoming messages, which can lead to an out-of-bounds read when the message is malformed or crafted maliciously. This vulnerability is classified under CWE-237, which relates to the use of a broken or risky comparison in input validation. When exploited, the SSH agent process may panic, effectively crashing the service and causing a denial of service (DoS) condition. The golang.org/x/crypto/ssh/agent package is widely used in Go applications that implement SSH agent forwarding or key management functionalities. Although no public exploits have been reported, the flaw presents a risk especially in environments where untrusted users or processes can send messages to the SSH agent. The absence of a CVSS score indicates that the vulnerability is newly published and not yet fully assessed. The vulnerability does not appear to allow code execution or privilege escalation but can disrupt availability by crashing the SSH agent. The lack of message size validation is a fundamental input validation error that can be addressed by implementing strict bounds checks before processing identity requests. This vulnerability highlights the importance of robust input validation in cryptographic and authentication components. Organizations using Go-based SSH agents in their infrastructure, CI/CD pipelines, or developer tools should be aware of this issue and plan for remediation once patches are available.

Potential Impact

For European organizations, the primary impact of CVE-2025-47914 is the potential for denial of service through crashing the SSH agent process. This can disrupt automated deployment pipelines, developer workflows, and any services relying on SSH agent forwarding or key management implemented via the vulnerable Go package. Organizations with large-scale cloud infrastructure, DevOps environments, or internal tooling built on Go may experience service interruptions or degraded operational efficiency. While the vulnerability does not directly expose sensitive data or allow unauthorized access, the disruption of SSH agent availability can delay critical operations and increase operational risk. In regulated industries such as finance, healthcare, or critical infrastructure, even temporary outages can have compliance and business continuity implications. Additionally, attackers could use this vulnerability as a vector to cause targeted disruptions or as part of a multi-stage attack chain. The impact is more pronounced in environments where multiple users or automated systems share the same SSH agent instance, increasing the attack surface. Overall, the vulnerability poses a moderate risk to confidentiality and integrity but a higher risk to availability of SSH-related services.

Mitigation Recommendations

To mitigate CVE-2025-47914, organizations should: 1) Monitor for updates from the golang.org/x/crypto project and apply patches promptly once available to ensure proper message size validation is implemented. 2) In the interim, restrict access to the SSH agent socket to trusted users and processes only, minimizing exposure to untrusted inputs. 3) Employ runtime monitoring and alerting for SSH agent crashes or panics to detect exploitation attempts early. 4) Consider isolating SSH agent instances per user or process to limit the blast radius of a potential crash. 5) Review and harden any custom Go code interfacing with the SSH agent to validate inputs rigorously. 6) Incorporate fuzz testing or input validation checks in development pipelines to detect similar issues proactively. 7) Educate developers and system administrators about the risks of untrusted input to SSH agents and best practices for secure SSH agent usage. These steps go beyond generic advice by focusing on access control, monitoring, and development hygiene specific to the Go SSH agent context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-05-13T23:31:29.597Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691e2bd54e81ab18fb452bf1

Added to database: 11/19/2025, 8:43:01 PM

Last enriched: 11/19/2025, 8:44:19 PM

Last updated: 11/19/2025, 10:02:26 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats