Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58181: CWE-1284 in golang.org/x/crypto golang.org/x/crypto/ssh

0
Medium
VulnerabilityCVE-2025-58181cvecve-2025-58181cwe-1284
Published: Wed Nov 19 2025 (11/19/2025, 20:33:42 UTC)
Source: CVE Database V5
Vendor/Project: golang.org/x/crypto
Product: golang.org/x/crypto/ssh

Description

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

AI-Powered Analysis

AILast updated: 11/26/2025, 21:11:38 UTC

Technical Analysis

CVE-2025-58181 is a vulnerability identified in the golang.org/x/crypto/ssh package, specifically in the handling of GSSAPI authentication requests by SSH servers. The issue stems from the server's failure to validate the number of GSSAPI mechanisms specified in an authentication request. GSSAPI (Generic Security Services Application Program Interface) is used to provide secure authentication, often in enterprise environments. When an attacker sends a crafted authentication request with an excessive or unbounded number of mechanisms, the server attempts to allocate memory to process these mechanisms without any upper limit checks. This leads to unbounded memory consumption, which can exhaust system resources and cause the SSH server to crash or become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability does not affect confidentiality or integrity since it does not allow unauthorized access or data manipulation, but it impacts availability. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack can be performed remotely without privileges or user interaction, but the impact is limited to availability. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-1284 (Improper Resource Shutdown or Release) and CWE-770 (Allocation of Resources Without Limits or Throttling), highlighting the root cause as improper resource management in the SSH server's GSSAPI authentication code.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of SSH servers that utilize the golang.org/x/crypto/ssh package with GSSAPI authentication enabled. Organizations relying on Go-based SSH implementations in their infrastructure, cloud services, or internal tools could experience service disruptions if targeted by an attacker exploiting this flaw. Critical sectors such as finance, telecommunications, energy, and government services that depend on SSH for secure remote access and automation may face operational downtime, impacting business continuity and incident response capabilities. Although the vulnerability does not expose sensitive data or allow unauthorized access, the denial of service could be leveraged as part of a broader attack strategy to disrupt operations or delay incident handling. The absence of known exploits reduces immediate risk, but the medium severity rating and ease of remote exploitation without authentication mean organizations should proactively address the issue to prevent potential future attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Monitor for updates from the golang.org/x/crypto project and apply patches promptly once available. 2) Implement network-level protections such as rate limiting and anomaly detection on SSH traffic to identify and block suspicious GSSAPI authentication requests with abnormal mechanism counts. 3) If feasible, disable GSSAPI authentication in SSH server configurations where it is not required, reducing the attack surface. 4) Employ resource usage monitoring and alerting on SSH servers to detect unusual memory consumption patterns indicative of exploitation attempts. 5) Consider deploying application-layer firewalls or SSH gateways that can enforce stricter protocol compliance and input validation. 6) Conduct internal audits of SSH server implementations and usage to identify and remediate any custom or third-party components based on the vulnerable Go crypto package. These steps go beyond generic advice by focusing on proactive detection, configuration hardening, and minimizing exposure to the vulnerable code path.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-08-27T14:50:58.691Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691e2bd54e81ab18fb452bf7

Added to database: 11/19/2025, 8:43:01 PM

Last enriched: 11/26/2025, 9:11:38 PM

Last updated: 1/7/2026, 5:03:44 AM

Views: 304

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats