CVE-2025-5372: Incorrect Calculation in Red Hat Red Hat Enterprise Linux 10
A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
AI Analysis
Technical Summary
CVE-2025-5372 is a medium-severity vulnerability identified in Red Hat Enterprise Linux 10, specifically affecting libssh versions compiled with OpenSSL versions older than 3.0. The flaw resides in the ssh_kdf() function, which is responsible for key derivation during SSH session establishment. The root cause is a mismatch in the interpretation of return values between OpenSSL and libssh: OpenSSL returns 0 to indicate failure, whereas libssh treats 0 as success. This inconsistency can cause ssh_kdf() to incorrectly report successful key derivation even when it has failed. Consequently, uninitialized cryptographic key buffers may be used in subsequent SSH communications. This undermines the confidentiality, integrity, and availability of SSH sessions, potentially allowing attackers to intercept or manipulate data or cause session failures. The vulnerability requires network access (AV:N), has a high attack complexity (AC:H), requires low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is low to medium. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The issue stems from a subtle but critical error in error handling between cryptographic libraries, emphasizing the importance of consistent API usage in security-sensitive code.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Red Hat Enterprise Linux 10 with affected libssh and OpenSSL versions. SSH is widely used for secure remote administration and automated processes; compromised SSH sessions could lead to unauthorized data access, session hijacking, or disruption of critical services. Confidentiality breaches could expose sensitive corporate or personal data, while integrity compromises might allow attackers to inject malicious commands or alter data in transit. Availability impacts could result from session failures or denial of service. Sectors such as finance, government, healthcare, and critical infrastructure, which rely heavily on secure remote access, are particularly at risk. Given the medium severity and the requirement for low privileges but high attack complexity, exploitation is less trivial but still feasible by skilled attackers. The absence of known exploits suggests a window for proactive mitigation. Failure to address this vulnerability could undermine trust in secure communications and regulatory compliance with data protection laws such as GDPR.
Mitigation Recommendations
European organizations should prioritize updating libssh and OpenSSL to versions where this inconsistency is resolved, ideally using OpenSSL 3.0 or later. Until patches are available, organizations should audit their SSH configurations to identify and isolate systems running vulnerable versions. Employ network segmentation and strict access controls to limit exposure of affected hosts. Monitoring SSH session logs for anomalies or failures may help detect exploitation attempts. Consider deploying host-based intrusion detection systems (HIDS) to alert on suspicious SSH activity. Where possible, enforce multi-factor authentication (MFA) to reduce risk from compromised sessions. Additionally, organizations should engage with Red Hat support channels for official patches or workarounds and test updates in controlled environments before deployment. Regular vulnerability scanning and penetration testing focused on SSH services can help identify residual risks. Finally, maintain incident response readiness to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2025-5372: Incorrect Calculation in Red Hat Red Hat Enterprise Linux 10
Description
A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-5372 is a medium-severity vulnerability identified in Red Hat Enterprise Linux 10, specifically affecting libssh versions compiled with OpenSSL versions older than 3.0. The flaw resides in the ssh_kdf() function, which is responsible for key derivation during SSH session establishment. The root cause is a mismatch in the interpretation of return values between OpenSSL and libssh: OpenSSL returns 0 to indicate failure, whereas libssh treats 0 as success. This inconsistency can cause ssh_kdf() to incorrectly report successful key derivation even when it has failed. Consequently, uninitialized cryptographic key buffers may be used in subsequent SSH communications. This undermines the confidentiality, integrity, and availability of SSH sessions, potentially allowing attackers to intercept or manipulate data or cause session failures. The vulnerability requires network access (AV:N), has a high attack complexity (AC:H), requires low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is low to medium. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The issue stems from a subtle but critical error in error handling between cryptographic libraries, emphasizing the importance of consistent API usage in security-sensitive code.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Red Hat Enterprise Linux 10 with affected libssh and OpenSSL versions. SSH is widely used for secure remote administration and automated processes; compromised SSH sessions could lead to unauthorized data access, session hijacking, or disruption of critical services. Confidentiality breaches could expose sensitive corporate or personal data, while integrity compromises might allow attackers to inject malicious commands or alter data in transit. Availability impacts could result from session failures or denial of service. Sectors such as finance, government, healthcare, and critical infrastructure, which rely heavily on secure remote access, are particularly at risk. Given the medium severity and the requirement for low privileges but high attack complexity, exploitation is less trivial but still feasible by skilled attackers. The absence of known exploits suggests a window for proactive mitigation. Failure to address this vulnerability could undermine trust in secure communications and regulatory compliance with data protection laws such as GDPR.
Mitigation Recommendations
European organizations should prioritize updating libssh and OpenSSL to versions where this inconsistency is resolved, ideally using OpenSSL 3.0 or later. Until patches are available, organizations should audit their SSH configurations to identify and isolate systems running vulnerable versions. Employ network segmentation and strict access controls to limit exposure of affected hosts. Monitoring SSH session logs for anomalies or failures may help detect exploitation attempts. Consider deploying host-based intrusion detection systems (HIDS) to alert on suspicious SSH activity. Where possible, enforce multi-factor authentication (MFA) to reduce risk from compromised sessions. Additionally, organizations should engage with Red Hat support channels for official patches or workarounds and test updates in controlled environments before deployment. Regular vulnerability scanning and penetration testing focused on SSH services can help identify residual risks. Finally, maintain incident response readiness to quickly address any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-30T11:22:02.534Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686770196f40f0eb729f595d
Added to database: 7/4/2025, 6:09:29 AM
Last enriched: 8/23/2025, 12:38:44 AM
Last updated: 9/29/2025, 5:59:05 AM
Views: 54
Related Threats
CVE-2025-53354: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2025-52653: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in HCL HCL MyXalytics
HighCVE-2025-57714: CWE-428 in QNAP Systems Inc. NetBak Replicator
HighCVE-2025-54154: CWE-287 in QNAP Systems Inc. QNAP Authenticator
MediumCVE-2025-54153: CWE-89 in QNAP Systems Inc. Qsync Central
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.