A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
{
"license": "CC-BY-4.0",
"sources": [
{
"modified": "2025-11-24T21:16:03.960Z",
"imported": "2025-11-25T21:57:29.294Z",
"id": "CVE-2025-5372",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-5372",
"published": "2025-07-04T06:15:24.930Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5372"
}
]
}