Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3731: Out-of-Bounds Read in libssh

0
Medium
VulnerabilityCVE-2026-3731cvecve-2026-3731
Published: Sun Mar 08 2026 (03/08/2026, 10:32:19 UTC)
Source: CVE Database V5
Product: libssh

Description

A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:05:09 UTC

Technical Analysis

CVE-2026-3731 identifies a vulnerability in the libssh library, specifically in versions 0.11.0 through 0.11.3, within the SFTP extension name handler component. The affected functions, sftp_extensions_get_name and sftp_extensions_get_data, improperly validate the 'idx' argument, which is used to index into internal data structures representing SFTP extensions. This improper validation can lead to an out-of-bounds read, where memory outside the intended buffer is accessed. Such out-of-bounds reads can cause application crashes or potentially leak sensitive memory contents, depending on the context and memory layout. The vulnerability is exploitable remotely without requiring authentication or user interaction, increasing its risk profile. The flaw was addressed by a patch (commit 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60) that properly validates the index before accessing memory. Upgrading to libssh versions 0.11.4 or 0.12.0 resolves the issue. Although no public exploits are known, the vulnerability's remote nature and lack of prerequisites make it a significant concern for systems relying on libssh for secure shell or SFTP operations.

Potential Impact

The primary impact of CVE-2026-3731 is the potential for remote attackers to cause out-of-bounds memory reads in applications using vulnerable libssh versions. This can lead to information disclosure if sensitive memory contents are exposed or to denial of service if the application crashes. Since libssh is widely used in SSH and SFTP implementations across various platforms, the vulnerability could affect numerous servers and network devices globally. Attackers could leverage this flaw to gain insights into memory layout or extract sensitive data, which might facilitate further attacks. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the threat to exposed services. While no active exploits are currently reported, the vulnerability's characteristics suggest that attackers could develop reliable exploits, especially targeting high-value infrastructure relying on libssh.

Mitigation Recommendations

Organizations should immediately upgrade libssh to versions 0.11.4 or 0.12.0 to remediate this vulnerability. Beyond upgrading, administrators should audit their environments to identify all instances of libssh usage, including embedded devices and network appliances, to ensure comprehensive patching. Employ network-level protections such as firewall rules to restrict SSH/SFTP access to trusted IP ranges, reducing exposure to remote attacks. Monitoring and logging SSH/SFTP traffic for anomalous behavior may help detect exploitation attempts. For environments where immediate upgrading is not feasible, consider disabling or restricting SFTP extensions if possible, or deploying application-layer proxies that can filter malformed requests. Regularly review vendor advisories for updates or additional patches related to libssh. Finally, incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T17:52:02.964Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae16ab2904315ca310d453

Added to database: 3/9/2026, 12:39:07 AM

Last enriched: 3/16/2026, 9:05:09 AM

Last updated: 4/24/2026, 10:04:18 AM

Views: 251

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses