Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61985: CWE-158 Improper Neutralization of Null Byte or NUL Character in OpenBSD OpenSSH

0
Low
VulnerabilityCVE-2025-61985cvecve-2025-61985cwe-158
Published: Mon Oct 06 2025 (10/06/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: OpenBSD
Product: OpenSSH

Description

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

AI-Powered Analysis

AILast updated: 10/06/2025, 18:37:04 UTC

Technical Analysis

CVE-2025-61985 is a security vulnerability identified in OpenSSH versions prior to 10.1, related to improper neutralization of the null byte ('\0') character within ssh:// URIs. The vulnerability is categorized under CWE-158, which concerns improper neutralization of null bytes that can lead to unexpected behavior in string processing. In this case, the ssh client fails to correctly handle the null byte embedded in the URI, which can be exploited when a ProxyCommand is configured. ProxyCommand allows SSH clients to specify an external command to connect to the SSH server, often used for proxying or tunneling connections. The presence of a null byte in the URI can truncate or manipulate the command string, potentially enabling an attacker to execute arbitrary code or commands on the client machine. The CVSS 3.1 base score is 3.6, reflecting low severity due to the requirement for local access (AV:L), high attack complexity (AC:H), and the need for low privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity to a limited extent, with no availability impact. No public exploits have been reported yet, and no patches are linked in the provided data, but upgrading to OpenSSH 10.1 or later is recommended to remediate the issue.

Potential Impact

For European organizations, the impact of CVE-2025-61985 is relatively low but non-negligible. The vulnerability could allow an attacker with local access and low privileges to execute arbitrary code on systems where OpenSSH clients prior to version 10.1 are used with ProxyCommand configurations. This could lead to unauthorized disclosure or modification of sensitive information, especially in environments where SSH is heavily used for secure communications and automation. Organizations in sectors such as finance, government, and critical infrastructure that rely on OpenSSH for secure remote access and proxying may face increased risk if this vulnerability is exploited. However, the high attack complexity and requirement for local access reduce the likelihood of widespread exploitation. Nonetheless, the presence of this vulnerability could be leveraged as part of a multi-stage attack chain, increasing overall risk posture.

Mitigation Recommendations

To mitigate CVE-2025-61985, European organizations should: 1) Upgrade all OpenSSH clients to version 10.1 or later where the vulnerability is fixed. 2) Audit and review all ProxyCommand configurations to ensure they do not process untrusted input or ssh:// URIs containing null bytes. 3) Implement strict input validation and sanitization for any scripts or commands invoked via ProxyCommand. 4) Restrict local user privileges to minimize the risk of exploitation by low-privilege users. 5) Monitor logs for unusual ProxyCommand usage or SSH client errors that may indicate attempted exploitation. 6) Educate system administrators and users about the risks of using outdated OpenSSH versions and unsafe ProxyCommand practices. 7) Employ host-based intrusion detection systems to detect anomalous command executions related to SSH client activity. These steps go beyond generic advice by focusing on the specific vector (ProxyCommand and ssh:// URI handling) and the operational context of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e40c3dcf87aa9c343ce4e1

Added to database: 10/6/2025, 6:36:45 PM

Last enriched: 10/6/2025, 6:37:04 PM

Last updated: 10/7/2025, 1:02:38 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats