Description
Axessh 4.2 contains a denial of service vulnerability in the logging configuration that allows local attackers to crash the application by supplying an excessively long string in the log file name field. Attackers can enable session logging, paste a buffer of 500 or more characters into the log file name parameter, and trigger a crash when establishing a telnet connection.
Published: 2026-03-22
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Immediately
AI Analysis

Impact

Axessh 4.2 contains a flaw in the logging configuration that only local users can exploit. By entering an excessively long string—500 characters or more—into the log file name field when session logging is enabled, the application crashes during the establishment of a telnet connection, causing a denial of service. This weakness is categorized as CWE‑1282 and provides a local attacker the ability to interrupt service availability for the application.

Affected Systems

The affected product is Axessh version 4.2 from the vendor Labf. No other versions or vendors are reported as affected. If an organization is running this specific version of Axessh, it is within the scope of the vulnerability.

Risk and Exploitability

The CVSS vector scores the vulnerability as 6.9, indicating medium severity. EPSS information is not available, but the lack of a KEV listing suggests no widespread exploitation has been observed. The attack requires local access to the system where Axessh is installed, limiting the threat to insiders or users with sufficient local privileges. Nevertheless, the impact—immediate application crash—can disrupt business operations until the service is restarted.

Generated by OpenCVE AI on March 22, 2026 at 14:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Axessh to the latest version or a version where the log filename handling issue is corrected.
  • If an upgrade is not feasible, disable session logging or ensure the log file name never exceeds a short, safe length such as 256 characters.
  • Monitor system logs for repeated crashes and apply a temporary configuration change to reduce the log file name length until a vendor patch is available.

Generated by OpenCVE AI on March 22, 2026 at 14:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Labf
Labf axessh
Vendors & Products Labf
Labf axessh

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description Axessh 4.2 contains a denial of service vulnerability in the logging configuration that allows local attackers to crash the application by supplying an excessively long string in the log file name field. Attackers can enable session logging, paste a buffer of 500 or more characters into the log file name parameter, and trigger a crash when establishing a telnet connection.
Title Axessh 4.2 Denial of Service via Log File Name
Weaknesses CWE-1282
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T15:31:59.793Z

Reserved: 2026-03-22T12:50:42.558Z

Link: CVE-2019-25590

cve-icon Vulnrichment

Updated: 2026-03-23T15:31:56.782Z

cve-icon NVD

Status : Deferred

Published: 2026-03-22T14:16:24.587

Modified: 2026-04-16T16:19:50.757

Link: CVE-2019-25590

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:46:26Z

Weaknesses