A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 07 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssh
Wolfssh wolfssh
Vendors & Products Wolfssh
Wolfssh wolfssh

Tue, 06 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 Jan 2026 18:00:00 +0000

Type Values Removed Values Added
Description A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.
Title Client SCP Request Triggers Buffer Overread by 1 Byte
Weaknesses CWE-125
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-01-06T18:13:28.245Z

Reserved: 2025-12-30T22:23:40.830Z

Link: CVE-2025-15382

cve-icon Vulnrichment

Updated: 2026-01-06T18:13:11.796Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-06T18:15:42.400

Modified: 2026-01-08T18:09:23.230

Link: CVE-2025-15382

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-07T10:08:23Z

Weaknesses