Metrics
Affected Vendors & Products
No advisories yet.
Solution
Applying this patch ( https://patch-diff.githubusercontent.com/raw/wolfSSL/wolfssh/pull/840.diff ) to versions 1.4.20 and older or updating version of wolfSSH used.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://github.com/wolfSSL/wolfssh/pull/840 |
![]() ![]() |
Tue, 21 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 21 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier clients that allows authentication bypass and leaking of clients credentials. | |
Title | Host verification bypass and credential leak | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2025-10-21T14:04:15.921Z
Reserved: 2025-10-10T21:06:46.601Z
Link: CVE-2025-11625

Updated: 2025-10-21T14:04:10.794Z

Status : Received
Published: 2025-10-21T14:15:46.997
Modified: 2025-10-21T14:15:46.997
Link: CVE-2025-11625

No data.

No data.