CVE-2023-25136
MEDIUM IN THE WILDOpenbsd Openssh - Double Free
Title source: ruleDescription
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Exploits (11)
nomisec
WORKING POC
42 stars
by jfrog · poc
https://github.com/jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free
nomisec
WORKING POC
1 stars
by Business1sg00d · poc
https://github.com/Business1sg00d/CVE-2023-25136
References (16)
Scores
CVSS v3
6.5
EPSS
0.9048
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Exploitation Intel
InTheWild.io
2023-03-24
Classification
CWE
CWE-415
Status
published
Affected Products (7)
openbsd/openssh
fedoraproject/fedora
fedoraproject/fedora
netapp/ontap_select_deploy_administration_utility
netapp/a250_firmware
netapp/500f_firmware
netapp/c250_firmware
Timeline
Published
Feb 03, 2023
Tracked Since
Feb 18, 2026