Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5987: Return of Wrong Status Code

0
High
VulnerabilityCVE-2025-5987cvecve-2025-5987
Published: Mon Jul 07 2025 (07/07/2025, 14:24:12 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:40:45 UTC

Technical Analysis

CVE-2025-5987 is a vulnerability discovered in libssh version 0.10.0, specifically when using the ChaCha20 cipher in conjunction with the OpenSSL cryptographic library. The root cause is a flaw in error handling: when the heap space is exhausted, OpenSSL returns an error code that aliases with SSH_OK, the success code in libssh. As a result, libssh fails to detect the error and proceeds with a partially initialized cipher context. This improper initialization can lead to undefined behavior, including potential compromise of data confidentiality and integrity or application crashes. The vulnerability is network exploitable without requiring authentication or user interaction, increasing its risk profile. It affects Red Hat Enterprise Linux 10, which bundles libssh 0.10.0. The CVSS v3.1 score is 8.1 (high), reflecting the critical impact on confidentiality, integrity, and availability, combined with network attack vector and no privileges required. Although no known exploits have been reported in the wild, the flaw could be leveraged by attackers to cause denial of service or potentially decrypt or manipulate SSH traffic, undermining secure communications. The issue stems from a subtle error code aliasing problem between OpenSSL and libssh, highlighting the importance of rigorous error handling in cryptographic libraries.

Potential Impact

The vulnerability poses a significant risk to organizations worldwide that use libssh with the ChaCha20 cipher, particularly those running Red Hat Enterprise Linux 10. Exploitation could allow remote attackers to cause application crashes (denial of service) or compromise the confidentiality and integrity of SSH sessions by using a partially initialized cipher context. This undermines the security guarantees of SSH, potentially exposing sensitive data or enabling unauthorized access. Critical infrastructure, cloud service providers, and enterprises relying on secure remote management via SSH are especially vulnerable. The flaw could disrupt operations, lead to data breaches, and erode trust in secure communications. Given the network-exploitable nature and no requirement for authentication, the attack surface is broad. The absence of known exploits currently provides a window for mitigation, but the high CVSS score indicates urgent attention is needed to prevent future exploitation.

Mitigation Recommendations

Organizations should immediately audit their use of libssh, particularly versions 0.10.0 on Red Hat Enterprise Linux 10 systems, and avoid using the ChaCha20 cipher with OpenSSL until patches are available. Applying vendor-supplied patches or updates as soon as they are released is critical. In the interim, consider disabling the ChaCha20 cipher in SSH configurations to prevent triggering the vulnerable code path. Implement monitoring for unusual SSH connection failures or crashes that could indicate exploitation attempts. Network-level protections such as firewall rules limiting SSH access to trusted hosts can reduce exposure. Additionally, conduct thorough testing of SSH implementations after patching to ensure error handling is correctly enforced. Security teams should stay informed via Red Hat advisories and CVE databases for updates. Finally, consider deploying intrusion detection systems with signatures for anomalous SSH behavior related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-10T21:55:45.552Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686bdc1a6f40f0eb72e9f8ac

Added to database: 7/7/2025, 2:39:22 PM

Last enriched: 3/20/2026, 9:40:45 PM

Last updated: 3/25/2026, 9:03:45 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses