Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier clients that allows authentication bypass and leaking of clients credentials.
Advisories

No advisories yet.

Fixes

Solution

Applying this patch ( https://patch-diff.githubusercontent.com/raw/wolfSSL/wolfssh/pull/840.diff ) to versions 1.4.20 and older or updating version of wolfSSH used.


Workaround

No workaround given by the vendor.

History

Tue, 21 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
Description Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier clients that allows authentication bypass and leaking of clients credentials.
Title Host verification bypass and credential leak
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2025-10-21T14:04:15.921Z

Reserved: 2025-10-10T21:06:46.601Z

Link: CVE-2025-11625

cve-icon Vulnrichment

Updated: 2025-10-21T14:04:10.794Z

cve-icon NVD

Status : Received

Published: 2025-10-21T14:15:46.997

Modified: 2025-10-21T14:15:46.997

Link: CVE-2025-11625

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.