CVE-2026-3731: Out-of-Bounds Read in libssh
A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.
AI Analysis
Technical Summary
CVE-2026-3731 is a medium-severity vulnerability affecting libssh versions 0.11.0 through 0.11.3. The vulnerability resides in the SFTP extension name handler, specifically in the functions sftp_extensions_get_name and sftp_extensions_get_data within src/sftp.c. An attacker can remotely manipulate the index parameter (idx) passed to these functions, causing an out-of-bounds read operation. This type of memory access flaw can lead to the disclosure of sensitive information from adjacent memory areas or cause application crashes due to invalid memory reads. The vulnerability does not require any authentication or user interaction, making it remotely exploitable by any attacker capable of initiating an SFTP connection to a vulnerable server. The patch, identified by commit 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60, corrects the bounds checking logic to prevent out-of-bounds reads. The issue was publicly disclosed on March 8, 2026, with a CVSS 4.0 base score of 6.9, reflecting its network attack vector, low complexity, and lack of required privileges or user interaction. No known exploits have been observed in the wild to date, but the vulnerability poses a risk to confidentiality and stability of systems running vulnerable libssh versions, particularly those exposing SFTP services.
Potential Impact
The primary impact of CVE-2026-3731 is the potential disclosure of sensitive memory contents due to out-of-bounds reads, which could include cryptographic keys, credentials, or other sensitive data residing in adjacent memory. Additionally, the vulnerability may cause application crashes or denial of service if invalid memory is accessed, impacting availability. Since libssh is widely used in SSH and SFTP implementations across many platforms, this vulnerability could affect a broad range of servers and network devices. Attackers can exploit this remotely without authentication, increasing the risk of automated scanning and exploitation attempts once public details are widely known. Organizations relying on libssh for secure file transfers or remote access may face data confidentiality risks and service disruptions if unpatched. Although no active exploits are reported, the ease of exploitation and network accessibility make timely patching critical to prevent potential compromise or service outages.
Mitigation Recommendations
To mitigate CVE-2026-3731, organizations should immediately upgrade libssh to version 0.11.4 or later, or 0.12.0 and above, where the vulnerability is patched. Network administrators should audit their environments to identify all systems running vulnerable libssh versions, including embedded devices, network appliances, and servers providing SSH/SFTP services. If immediate upgrade is not feasible, consider implementing network-level controls such as firewall rules to restrict access to SFTP services to trusted IP ranges only. Monitoring network traffic for unusual SFTP connection attempts and enabling detailed logging can help detect potential exploitation attempts. Additionally, review and harden SSH/SFTP configurations to minimize exposure, such as disabling unused extensions or features. Regularly update and patch all software dependencies to reduce the attack surface. Finally, maintain an incident response plan to quickly address any suspicious activity related to this vulnerability.
Affected Countries
United States, Germany, China, Japan, United Kingdom, France, India, South Korea, Canada, Australia
CVE-2026-3731: Out-of-Bounds Read in libssh
Description
A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2026-3731 is a medium-severity vulnerability affecting libssh versions 0.11.0 through 0.11.3. The vulnerability resides in the SFTP extension name handler, specifically in the functions sftp_extensions_get_name and sftp_extensions_get_data within src/sftp.c. An attacker can remotely manipulate the index parameter (idx) passed to these functions, causing an out-of-bounds read operation. This type of memory access flaw can lead to the disclosure of sensitive information from adjacent memory areas or cause application crashes due to invalid memory reads. The vulnerability does not require any authentication or user interaction, making it remotely exploitable by any attacker capable of initiating an SFTP connection to a vulnerable server. The patch, identified by commit 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60, corrects the bounds checking logic to prevent out-of-bounds reads. The issue was publicly disclosed on March 8, 2026, with a CVSS 4.0 base score of 6.9, reflecting its network attack vector, low complexity, and lack of required privileges or user interaction. No known exploits have been observed in the wild to date, but the vulnerability poses a risk to confidentiality and stability of systems running vulnerable libssh versions, particularly those exposing SFTP services.
Potential Impact
The primary impact of CVE-2026-3731 is the potential disclosure of sensitive memory contents due to out-of-bounds reads, which could include cryptographic keys, credentials, or other sensitive data residing in adjacent memory. Additionally, the vulnerability may cause application crashes or denial of service if invalid memory is accessed, impacting availability. Since libssh is widely used in SSH and SFTP implementations across many platforms, this vulnerability could affect a broad range of servers and network devices. Attackers can exploit this remotely without authentication, increasing the risk of automated scanning and exploitation attempts once public details are widely known. Organizations relying on libssh for secure file transfers or remote access may face data confidentiality risks and service disruptions if unpatched. Although no active exploits are reported, the ease of exploitation and network accessibility make timely patching critical to prevent potential compromise or service outages.
Mitigation Recommendations
To mitigate CVE-2026-3731, organizations should immediately upgrade libssh to version 0.11.4 or later, or 0.12.0 and above, where the vulnerability is patched. Network administrators should audit their environments to identify all systems running vulnerable libssh versions, including embedded devices, network appliances, and servers providing SSH/SFTP services. If immediate upgrade is not feasible, consider implementing network-level controls such as firewall rules to restrict access to SFTP services to trusted IP ranges only. Monitoring network traffic for unusual SFTP connection attempts and enabling detailed logging can help detect potential exploitation attempts. Additionally, review and harden SSH/SFTP configurations to minimize exposure, such as disabling unused extensions or features. Regularly update and patch all software dependencies to reduce the attack surface. Finally, maintain an incident response plan to quickly address any suspicious activity related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-07T17:52:02.964Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ae16ab2904315ca310d453
Added to database: 3/9/2026, 12:39:07 AM
Last enriched: 3/9/2026, 12:41:04 AM
Last updated: 3/11/2026, 8:08:43 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.