Vulnerability Description
A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a significant risk to the confidentiality, integrity, and availability of SSH communications via an insecure default configuration on Windows systems where the library automatically loads configuration files from the C:\etc directory, which can be created and modified by unprivileged local users.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libssh | Libssh | < 0.12.0 |
| Redhat | Hardened Images | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:7067Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-14821Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2423148Issue TrackingThird Party Advisory
- https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/Release Notes
FAQ
What is CVE-2025-14821?
CVE-2025-14821 is a vulnerability with a CVSS score of 7.8 (HIGH). A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a sig...
How severe is CVE-2025-14821?
CVE-2025-14821 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-14821?
Check the references section above for vendor advisories and patch information. Affected products include: Libssh Libssh, Redhat Hardened Images.