Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47914: CWE-237 in golang.org/x/crypto golang.org/x/crypto/ssh/agent

0
Medium
VulnerabilityCVE-2025-47914cvecve-2025-47914cwe-237
Published: Wed Nov 19 2025 (11/19/2025, 20:33:43 UTC)
Source: CVE Database V5
Vendor/Project: golang.org/x/crypto
Product: golang.org/x/crypto/ssh/agent

Description

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

AI-Powered Analysis

AILast updated: 11/26/2025, 21:11:24 UTC

Technical Analysis

CVE-2025-47914 identifies a vulnerability in the golang.org/x/crypto/ssh/agent package, specifically in the handling of new identity requests. The SSH agent server component fails to validate the size of incoming messages before processing them. This lack of validation can cause the program to perform an out-of-bounds read when a malformed message is received, leading to a runtime panic and crash of the SSH agent process. The underlying issue is categorized under CWE-237 (Improper Handling of Exceptional Conditions) and CWE-125 (Out-of-bounds Read). The vulnerability is remotely exploitable without any authentication or user interaction, as the SSH agent listens for requests over a communication channel. The impact is limited to availability, as the crash results in denial of service but does not expose confidentiality or integrity risks. The CVSS v3.1 base score is 5.3 (medium), reflecting the ease of exploitation and limited impact scope. No patches or exploits are currently publicly available, but the vulnerability is present in all versions prior to a fix. The SSH agent is widely used in Go-based environments for managing SSH keys, making this a relevant issue for developers and systems relying on this library for secure communications.

Potential Impact

For European organizations, the primary impact of CVE-2025-47914 is the potential denial of service of SSH agent services, which could disrupt automated deployment, secure shell access, and key management workflows. This disruption can affect development pipelines, cloud infrastructure management, and internal secure communications. Organizations that embed the vulnerable Go SSH agent in their software or infrastructure tools may experience outages or degraded service availability. While the vulnerability does not directly compromise data confidentiality or integrity, the loss of availability in critical systems could delay operations and increase incident response costs. Sectors such as finance, telecommunications, government, and technology companies with heavy reliance on Go-based tooling are particularly at risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks exploiting this flaw.

Mitigation Recommendations

To mitigate CVE-2025-47914, organizations should monitor golang.org/x/crypto project updates and apply patches promptly once available. Until a patch is released, consider implementing strict input validation at the network boundary to block malformed SSH agent messages. Employ network segmentation and firewall rules to restrict access to SSH agent communication channels only to trusted hosts and users. Use process monitoring and automated recovery mechanisms to detect and restart crashed SSH agent processes to minimize downtime. Review and update internal development and deployment tools to ensure they do not expose the vulnerable SSH agent interface externally. Additionally, consider alternative SSH agent implementations or wrappers that include robust message size validation. Conduct security testing and fuzzing on SSH agent interfaces to proactively identify similar issues. Finally, educate developers and system administrators about the vulnerability and encourage secure coding and operational practices around SSH key management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-05-13T23:31:29.597Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691e2bd54e81ab18fb452bf1

Added to database: 11/19/2025, 8:43:01 PM

Last enriched: 11/26/2025, 9:11:24 PM

Last updated: 1/7/2026, 4:22:23 AM

Views: 259

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats