CVE-2025-54804: CWE-190: Integer Overflow or Wraparound in Eugeny russh
Russh is a Rust SSH client & server library. In versions 0.54.0 and below, the channel window adjust message of the SSH protocol is used to track the free space in the receive buffer of the other side of a channel. The current implementation takes the value from the message and adds it to an internal state value. This can result in a integer overflow. If the Rust code is compiled with overflow checks, it will panic. A malicious client can crash a server. This is fixed in version 0.54.1.
AI Analysis
Technical Summary
CVE-2025-54804 is a medium severity vulnerability affecting the Eugeny russh library, a Rust-based SSH client and server implementation. The flaw exists in versions 0.54.0 and earlier, specifically in the handling of the SSH channel window adjust message. This message is used to communicate the available space in the receive buffer of the opposite channel endpoint. The russh implementation adds the value from this message to an internal state variable that tracks free buffer space. However, this addition can cause an integer overflow or wraparound due to insufficient bounds checking. When compiled with Rust's overflow checks enabled, this overflow triggers a panic, causing the russh server process to crash. This effectively allows a malicious SSH client to perform a denial-of-service (DoS) attack by sending crafted channel window adjust messages that exploit the integer overflow. The vulnerability does not impact confidentiality or integrity but affects availability by crashing the server. It requires the attacker to have at least some level of authenticated access (PR:L) and does not require user interaction (UI:N). The vulnerability is fixed in russh version 0.54.1. No known exploits are reported in the wild as of now. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, and no impact on confidentiality or integrity but high impact on availability.
Potential Impact
For European organizations, the primary impact of CVE-2025-54804 is the risk of denial-of-service attacks against SSH servers or clients using the vulnerable russh library. Since SSH is widely used for secure remote administration, disruption of SSH services can lead to operational downtime, loss of remote management capabilities, and potential delays in incident response or system maintenance. This can affect critical infrastructure, enterprise IT environments, and cloud services relying on russh for SSH connectivity. Although the vulnerability does not allow unauthorized data access or code execution, the availability impact can be significant in environments where SSH access is essential for business continuity. Organizations in sectors such as finance, telecommunications, government, and managed service providers in Europe could face operational risks if their systems incorporate vulnerable russh versions. The lack of known exploits reduces immediate risk, but the ease of triggering the overflow with authenticated access means that insider threats or compromised credentials could be leveraged to cause service disruption.
Mitigation Recommendations
European organizations should immediately audit their software inventories to identify any use of the russh library, particularly versions below 0.54.1. Systems using vulnerable versions must be upgraded to russh 0.54.1 or later to apply the fix for the integer overflow. Where upgrading is not immediately feasible, organizations should implement network-level controls to restrict SSH access to trusted clients and monitor SSH session behavior for anomalous channel window adjust messages. Enforcing strict authentication and access controls reduces the risk of exploitation since the vulnerability requires at least some level of authenticated access. Additionally, enabling Rust overflow checks during development and testing phases can help detect similar issues early. Logging and alerting on SSH server crashes or panics can provide early warning of attempted exploitation. Finally, organizations should incorporate this vulnerability into their incident response plans to quickly remediate any DoS events caused by this flaw.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2025-54804: CWE-190: Integer Overflow or Wraparound in Eugeny russh
Description
Russh is a Rust SSH client & server library. In versions 0.54.0 and below, the channel window adjust message of the SSH protocol is used to track the free space in the receive buffer of the other side of a channel. The current implementation takes the value from the message and adds it to an internal state value. This can result in a integer overflow. If the Rust code is compiled with overflow checks, it will panic. A malicious client can crash a server. This is fixed in version 0.54.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-54804 is a medium severity vulnerability affecting the Eugeny russh library, a Rust-based SSH client and server implementation. The flaw exists in versions 0.54.0 and earlier, specifically in the handling of the SSH channel window adjust message. This message is used to communicate the available space in the receive buffer of the opposite channel endpoint. The russh implementation adds the value from this message to an internal state variable that tracks free buffer space. However, this addition can cause an integer overflow or wraparound due to insufficient bounds checking. When compiled with Rust's overflow checks enabled, this overflow triggers a panic, causing the russh server process to crash. This effectively allows a malicious SSH client to perform a denial-of-service (DoS) attack by sending crafted channel window adjust messages that exploit the integer overflow. The vulnerability does not impact confidentiality or integrity but affects availability by crashing the server. It requires the attacker to have at least some level of authenticated access (PR:L) and does not require user interaction (UI:N). The vulnerability is fixed in russh version 0.54.1. No known exploits are reported in the wild as of now. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, and no impact on confidentiality or integrity but high impact on availability.
Potential Impact
For European organizations, the primary impact of CVE-2025-54804 is the risk of denial-of-service attacks against SSH servers or clients using the vulnerable russh library. Since SSH is widely used for secure remote administration, disruption of SSH services can lead to operational downtime, loss of remote management capabilities, and potential delays in incident response or system maintenance. This can affect critical infrastructure, enterprise IT environments, and cloud services relying on russh for SSH connectivity. Although the vulnerability does not allow unauthorized data access or code execution, the availability impact can be significant in environments where SSH access is essential for business continuity. Organizations in sectors such as finance, telecommunications, government, and managed service providers in Europe could face operational risks if their systems incorporate vulnerable russh versions. The lack of known exploits reduces immediate risk, but the ease of triggering the overflow with authenticated access means that insider threats or compromised credentials could be leveraged to cause service disruption.
Mitigation Recommendations
European organizations should immediately audit their software inventories to identify any use of the russh library, particularly versions below 0.54.1. Systems using vulnerable versions must be upgraded to russh 0.54.1 or later to apply the fix for the integer overflow. Where upgrading is not immediately feasible, organizations should implement network-level controls to restrict SSH access to trusted clients and monitor SSH session behavior for anomalous channel window adjust messages. Enforcing strict authentication and access controls reduces the risk of exploitation since the vulnerability requires at least some level of authenticated access. Additionally, enabling Rust overflow checks during development and testing phases can help detect similar issues early. Logging and alerting on SSH server crashes or panics can provide early warning of attempted exploitation. Finally, organizations should incorporate this vulnerability into their incident response plans to quickly remediate any DoS events caused by this flaw.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-29T16:50:28.395Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689154aead5a09ad00e467fb
Added to database: 8/5/2025, 12:47:42 AM
Last enriched: 8/5/2025, 1:04:32 AM
Last updated: 9/16/2025, 12:07:50 PM
Views: 17
Related Threats
CVE-2025-59345: CWE-306: Missing Authentication for Critical Function in dragonflyoss dragonfly
LowCVE-2025-59348: CWE-457: Use of Uninitialized Variable in dragonflyoss dragonfly
MediumCVE-2025-37122: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking ClearPass Policy Manager
MediumCVE-2025-10614: Cross Site Scripting in itsourcecode E-Logbook with Health Monitoring System for COVID-19
MediumCVE-2025-59347: CWE-295: Improper Certificate Validation in dragonflyoss dragonfly
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.