Description
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Exploits (11)
nomisec
WORKING POC
42 stars
by jfrog · poc
https://github.com/jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free
nomisec
WORKING POC
1 stars
by Business1sg00d · poc
https://github.com/Business1sg00d/CVE-2023-25136
References (16)
Core 16
Core References
Exploit, Issue Tracking, Third Party Advisory
https://bugzilla.mindrot.org/show_bug.cgi?id=3522
Patch, Vendor Advisory
https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig
Patch, Third Party Advisory
https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946
Exploit, Third Party Advisory
https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/
Issue Tracking, Third Party Advisory
https://news.ycombinator.com/item?id=34711565
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230309-0003/
Exploit, Mailing List, Third Party Advisory
https://www.openwall.com/lists/oss-security/2023/02/02/2
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/02/13/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/02/22/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/02/22/2
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/02/23/3
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/03/06/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/03/09/2
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202307-01
Scores
CVSS v3
6.5
EPSS
0.8833
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Details
InTheWild.io
2023-03-24
CWE
CWE-415
Status
published
Products (7)
fedoraproject/fedora
37
fedoraproject/fedora
38
netapp/500f_firmware
netapp/a250_firmware
netapp/c250_firmware
netapp/ontap_select_deploy_administration_utility
openbsd/openssh
9.1
Published
Feb 03, 2023
Tracked Since
Feb 18, 2026