Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5318: Out-of-bounds Read

0
High
VulnerabilityCVE-2025-5318cvecve-2025-5318
Published: Tue Jun 24 2025 (06/24/2025, 14:10:07 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 01:47:08 UTC

Technical Analysis

CVE-2025-5318 is a vulnerability identified in the libssh library versions earlier than 0.11.2, specifically impacting the sftp_handle function. The flaw arises from an incorrect comparison check that fails to properly validate the index used to access the handle list. This improper boundary validation allows the function to read memory outside the bounds of the valid handle array, returning an invalid pointer. Subsequent processing of this pointer can lead to unauthorized reading of memory regions that may contain sensitive data. The vulnerability requires the attacker to be authenticated to the SSH service but does not require user interaction, making it remotely exploitable over the network. The vulnerability affects Red Hat Enterprise Linux 10, which bundles libssh in its software stack. The CVSS v3.1 score of 8.1 indicates a high severity, with a vector showing network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). Although no exploits are currently known in the wild, the potential for sensitive data exposure and service disruption is significant. The vulnerability was reserved on May 29, 2025, and published on June 24, 2025, with no patch links provided yet, indicating the need for vigilance and prompt patching once available.

Potential Impact

The vulnerability allows an authenticated remote attacker to read memory beyond intended boundaries, potentially exposing sensitive information such as cryptographic keys, user credentials, or other confidential data stored in memory. This breach of confidentiality can lead to further compromise of systems and data. Additionally, the out-of-bounds read can cause instability or crashes in the SSH service, impacting availability and potentially leading to denial of service conditions. Given that SSH is a critical service for secure remote management and file transfers, disruption can affect operational continuity. Organizations relying on Red Hat Enterprise Linux 10 or other systems using vulnerable libssh versions are at risk of data leakage and service outages. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments where credentials may be compromised or weak. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation, especially given the high severity score.

Mitigation Recommendations

Organizations should immediately inventory their systems to identify libssh versions in use, particularly focusing on Red Hat Enterprise Linux 10 deployments. Apply the official patch or upgrade libssh to version 0.11.2 or later as soon as it becomes available. Until patches are applied, restrict SSH access to trusted users and networks, enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of unauthorized access, and monitor SSH logs for unusual activity indicative of exploitation attempts. Employ memory protection techniques and runtime security tools that can detect anomalous memory access patterns. Additionally, consider isolating critical SSH services in segmented network zones to limit exposure. Regularly update and audit SSH configurations to minimize attack surface and ensure that only necessary users have SSH privileges. Coordinate with vendors and subscribe to security advisories for timely updates on patches and exploit developments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-29T07:01:42.703Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685ab29b8e5e669c7fb575fc

Added to database: 6/24/2025, 2:13:47 PM

Last enriched: 3/19/2026, 1:47:08 AM

Last updated: 3/28/2026, 9:35:41 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses