CVE-2025-32728
Ubuntu Security Notice USN-7457-1
Severity Score
4.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.
This update for openssh fixes the following issue. Fixed logic error in DisableForwarding option. Fixed ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized. The problem was introduced in the rebase of the patch for 9.6p1. Enable --with-logind to call the SetTTY dbus method in systemd. This allows "wall" to print messages in ssh ttys.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-04-10 CVE Reserved
- 2025-04-10 CVE Published
- 2025-05-08 CVE Updated
- 2025-08-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-440: Expected Behavior Violation
CAPEC
References (5)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
OpenBSD Search vendor "OpenBSD" | OpenSSH Search vendor "OpenBSD" for product "OpenSSH" | >= 7.4 < 10.0 Search vendor "OpenBSD" for product "OpenSSH" and version " >= 7.4 < 10.0" | en |
Affected
|