CVE-2023-25136

MEDIUM IN THE WILD

Openbsd Openssh - Double Free

Title source: rule

Description

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

Exploits (11)

nomisec SCANNER 106 stars
by Christbowel · poc
https://github.com/Christbowel/CVE-2023-25136
nomisec SCANNER 47 stars
by adhikara13 · poc
https://github.com/adhikara13/CVE-2023-25136
nomisec WORKING POC 42 stars
by jfrog · poc
https://github.com/jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free
nomisec SUSPICIOUS 8 stars
by nhakobyan685 · poc
https://github.com/nhakobyan685/CVE-2023-25136
nomisec SCANNER 5 stars
by H4K6 · poc
https://github.com/H4K6/CVE-2023-25136
nomisec WRITEUP 3 stars
by malvika-thakur · poc
https://github.com/malvika-thakur/CVE-2023-25136
nomisec SCANNER 3 stars
by ticofookfook · poc
https://github.com/ticofookfook/CVE-2023-25136
nomisec SCANNER 3 stars
by axylisdead · poc
https://github.com/axylisdead/CVE-2023-25136_POC
nomisec SCANNER 1 stars
by mrmtwoj · poc
https://github.com/mrmtwoj/CVE-2023-25136
nomisec WORKING POC 1 stars
by Business1sg00d · poc
https://github.com/Business1sg00d/CVE-2023-25136
nomisec WORKING POC
by Lane0218 · poc
https://github.com/Lane0218/CVE-2023-25136-PoC

References (16)

Scores

CVSS v3 6.5
EPSS 0.9048
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

Exploitation Intel

InTheWild.io 2023-03-24

Classification

CWE
CWE-415
Status published

Affected Products (7)

openbsd/openssh
fedoraproject/fedora
fedoraproject/fedora
netapp/ontap_select_deploy_administration_utility
netapp/a250_firmware
netapp/500f_firmware
netapp/c250_firmware

Timeline

Published Feb 03, 2023
Tracked Since Feb 18, 2026