Skip to main content

CVE-2025-5372: Incorrect Calculation in Red Hat Red Hat Enterprise Linux 10

Medium
VulnerabilityCVE-2025-5372cvecve-2025-5372
Published: Fri Jul 04 2025 (07/04/2025, 06:01:27 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

AI-Powered Analysis

AILast updated: 08/01/2025, 00:41:56 UTC

Technical Analysis

CVE-2025-5372 is a medium-severity vulnerability affecting Red Hat Enterprise Linux 10 systems that use libssh versions built with OpenSSL versions older than 3.0. The flaw resides in the ssh_kdf() function, which is responsible for key derivation during SSH session establishment. The root cause is a mismatch in interpreting return values between OpenSSL and libssh: OpenSSL returns 0 to indicate failure, whereas libssh treats 0 as success. This inconsistency can cause ssh_kdf() to incorrectly report a successful key derivation even when it has failed. As a result, uninitialized cryptographic key buffers may be used in subsequent SSH communications. This undermines the confidentiality, integrity, and availability of SSH sessions, potentially allowing attackers to intercept or manipulate data or cause session disruptions. The vulnerability requires network access (AV:N), has a high attack complexity (AC:H), requires low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is low (C:L/I:L/A:L), leading to an overall CVSS score of 5.0 (medium severity). No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability specifically affects Red Hat Enterprise Linux 10 installations using the affected libssh and OpenSSL versions, which are common in enterprise environments relying on SSH for secure remote access and management.

Potential Impact

For European organizations, this vulnerability poses a risk to secure remote administration and automated processes relying on SSH. Compromise of SSH session confidentiality could lead to exposure of sensitive credentials or data, while integrity issues might allow attackers to inject malicious commands or alter data in transit. Availability impacts could disrupt critical services dependent on SSH connectivity. Given the widespread use of Red Hat Enterprise Linux in European government, financial, telecommunications, and industrial sectors, exploitation could affect critical infrastructure and sensitive operations. The medium severity and requirement for low privileges mean that insider threats or attackers with limited access could potentially exploit this flaw. Although no exploits are known yet, the vulnerability could be leveraged in targeted attacks against organizations with outdated OpenSSL versions, especially where patching cycles are slow or where legacy systems remain in use.

Mitigation Recommendations

European organizations should first identify all Red Hat Enterprise Linux 10 systems using libssh built with OpenSSL versions older than 3.0. Immediate mitigation involves upgrading OpenSSL to version 3.0 or later, where the return value semantics are consistent with libssh. If upgrading OpenSSL is not immediately feasible, organizations should consider recompiling libssh against a patched or updated OpenSSL library that aligns return codes correctly. Additionally, monitoring SSH session logs for anomalies or failures in key derivation could help detect exploitation attempts. Network segmentation and limiting SSH access to trusted hosts can reduce exposure. Implementing strict privilege management to minimize users with SSH access and employing multi-factor authentication can further reduce risk. Finally, organizations should stay alert for official patches from Red Hat and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-30T11:22:02.534Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686770196f40f0eb729f595d

Added to database: 7/4/2025, 6:09:29 AM

Last enriched: 8/1/2025, 12:41:56 AM

Last updated: 8/18/2025, 1:22:22 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats