Description
A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a significant risk to the confidentiality, integrity, and availability of SSH communications via an insecure default configuration on Windows systems where the library automatically loads configuration files from the C:\etc directory, which can be created and modified by unprivileged local users.
Problem types
Uncontrolled Search Path Element
Product status
0.12.0-1.1.hum1 (rpm) before *
Timeline
| 2025-12-17: | Reported to Red Hat. |
| 2026-02-10: | Made public. |
Credits
Red Hat would like to thank Martin Grubhofer for reporting this issue.
References
access.redhat.com/errata/RHSA-2026:7067 (RHSA-2026:7067)
access.redhat.com/security/cve/CVE-2025-14821
bugzilla.redhat.com/show_bug.cgi?id=2423148 (RHBZ#2423148)
www.libssh.org/...ibssh-0-12-0-and-0-11-4-security-releases/