Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70034: n/a

0
High
VulnerabilityCVE-2025-70034cvecve-2025-70034
Published: Mon Mar 09 2026 (03/09/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue pertaining to CWE-1333: Inefficient Regular Expression Complexity (4.19) was discovered in mscdex ssh2 v1.17.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 18:58:51 UTC

Technical Analysis

CVE-2025-70034 identifies a vulnerability in the mscdex ssh2 library version 1.17.0, specifically related to inefficient regular expression complexity categorized under CWE-1333. This type of vulnerability arises when a regular expression used in the software is constructed in a way that causes excessive backtracking or computational overhead when processing certain inputs. Attackers can exploit this by sending specially crafted input to the SSH2 service, triggering the inefficient regex evaluation and causing the service to consume excessive CPU or memory resources. This results in a denial of service (DoS) condition, where legitimate users may be unable to establish SSH connections or the server may become unresponsive. The CVSS v3.1 score of 7.5 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No patches or fixes have been released yet, and no known exploits have been observed in the wild. The vulnerability affects all deployments of mscdex ssh2 v1.17.0, though specific affected versions are not detailed. Given the nature of SSH as a critical remote access protocol, this vulnerability poses a significant risk to systems relying on this library for secure communications.

Potential Impact

The primary impact of CVE-2025-70034 is denial of service, which can disrupt remote access to affected systems by exhausting CPU or memory resources during SSH connection attempts. This can lead to operational downtime, loss of productivity, and potential disruption of critical services, especially in environments where SSH is heavily relied upon for administration and automation. Since the vulnerability does not compromise confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, the unavailability of SSH access can delay incident response, patching, or recovery efforts, indirectly increasing organizational risk. The ease of exploitation (no authentication or user interaction required) and network accessibility make this vulnerability particularly dangerous for exposed systems. Organizations with internet-facing SSH services using the vulnerable library are at heightened risk of targeted DoS attacks, which could be leveraged as part of broader attack campaigns or ransomware operations. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation.

Mitigation Recommendations

1. Monitor official channels and vendor advisories for patches or updates addressing CVE-2025-70034 and apply them promptly once available. 2. Restrict SSH access using network-level controls such as firewalls, VPNs, or IP whitelisting to limit exposure to trusted sources only. 3. Implement rate limiting or connection throttling on SSH services to mitigate the impact of resource exhaustion attacks. 4. Deploy intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous SSH traffic patterns indicative of exploitation attempts. 5. Consider temporarily disabling or replacing the vulnerable mscdex ssh2 library with alternative SSH implementations if feasible. 6. Conduct regular security assessments and penetration tests focusing on SSH services to identify and remediate potential attack vectors. 7. Maintain robust logging and monitoring to quickly detect and respond to unusual SSH connection failures or performance degradation. 8. Educate system administrators about this vulnerability and the importance of minimizing SSH exposure and promptly applying security updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69af0116ea502d3aa8929a41

Added to database: 3/9/2026, 5:19:18 PM

Last enriched: 3/16/2026, 6:58:51 PM

Last updated: 4/23/2026, 10:57:43 PM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses