MEDIUM · 6.5

CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote at...

Vulnerability Description

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
HIGH

Affected Products

VendorProductVersions
OpenbsdOpenssh9.1
FedoraprojectFedora37
NetappOntap Select Deploy Administration Utility-
NetappA250 Firmware-
NetappA250-
Netapp500F Firmware-
Netapp500F-
NetappC250 Firmware-
NetappC250-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-25136?

CVE-2023-25136 is a vulnerability with a CVSS score of 6.5 (MEDIUM). OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote at...

How severe is CVE-2023-25136?

CVE-2023-25136 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-25136?

Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openssh, Fedoraproject Fedora, Netapp Ontap Select Deploy Administration Utility, Netapp A250 Firmware, Netapp A250.