Home

Description

A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a significant risk to the confidentiality, integrity, and availability of SSH communications via an insecure default configuration on Windows systems where the library automatically loads configuration files from the C:\etc directory, which can be created and modified by unprivileged local users.

PUBLISHED Reserved 2025-12-17 | Published 2026-04-07 | Updated 2026-04-28 | Assigner redhat




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Uncontrolled Search Path Element

Product status

Default status
affected

0.12.0-1.1.hum1 (rpm) before *
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Timeline

2025-12-17:Reported to Red Hat.
2026-02-10:Made public.

Credits

Red Hat would like to thank Martin Grubhofer for reporting this issue.

References

access.redhat.com/errata/RHSA-2026:7067 (RHSA-2026:7067) vendor-advisory

access.redhat.com/security/cve/CVE-2025-14821 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2423148 (RHBZ#2423148) issue-tracking

www.libssh.org/...ibssh-0-12-0-and-0-11-4-security-releases/

cve.org (CVE-2025-14821)

nvd.nist.gov (CVE-2025-14821)

Download JSON