PT-2025-40939 · Openbsd+10 · Openssh+10

David Leadbeater

·

Published

2025-10-06

·

Updated

2026-03-19

·

CVE-2025-61984

CVSS v3.1

3.6

Low

AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Name of the Vulnerable Software and Affected Versions OpenSSH versions prior to 10.1 Alma Linux (affected versions not specified) SUSE (affected versions not specified) IBM AIX (affected versions not specified) Fortinet FortiWeb (affected versions not specified)
Description OpenSSH before version 10.1 contains a command injection flaw within the ProxyCommand functionality. This issue arises from the improper handling of control characters within usernames, potentially allowing an attacker to execute arbitrary code. The vulnerability is triggered when a ProxyCommand is used and the username contains control characters originating from untrusted sources, such as the command line or through %-sequence expansion in a configuration file. Successful exploitation could lead to remote code execution. The vulnerability is actively being exploited, and proof-of-concept exploits are publicly available. The ProxyCommand feature is used in various environments, including bastions, CI/CD pipelines, and helper scripts, increasing the potential attack surface.
Recommendations Upgrade OpenSSH to version 10.1 or later. Disable or limit the use of the ProxyCommand functionality if it is not essential. If ProxyCommand must be used, avoid building SSH commands from untrusted input. Set a literal User in the ssh config to avoid unsafe % expansions. Hunt for unusual ProxyCommand invocations in auth.log. Rotate SSH keys and tighten ingress access control lists. Treat potentially compromised hosts as such until proven otherwise.

Exploit

Fix

RCE

Weakness Enumeration

Related Identifiers

ALSA-2025:23479
ALSA-2025:23480
ALSA-2025:23481
ALSA-2025_23480
ALSA-2025_23481
BDU:2025-12884
CVE-2025-61984
ECHO-8420-5303-4F71
JLSEC-2025-7
MGASA-2026-0059
OESA-2025-2582
OESA-2025-2583
OESA-2025-2584
OESA-2025-2585
OESA-2025-2586
OESA-2025-2646
OPENSUSE-SU-2025:20122-1
RHSA-2025:23479
RHSA-2025:23480
RHSA-2025:23481
RHSA-2026:0693
RHSA-2026:0976
RHSA-2026:1678
RHSA-2026:1790
RHSA-2026:1815
SUSE-SU-2025:21044-1
SUSE-SU-2025:21128-1
SUSE-SU-2025:21161-1
SUSE-SU-2025:4067-1
SUSE-SU-2025:4097-1
SUSE-SU-2025:4098-1
SUSE-SU-2025:4112-1
SUSE-SU-2025_21161-1
SUSE-SU-2025_4067-1
SUSE-SU-2025_4097-1
SUSE-SU-2025_4098-1
SUSE-SU-2025_4112-1
SUSE-SU-2026:20662-1
USN-8090-1
USN-8090-2

Affected Products

Almalinux
Centos
Debian
Ibm Aix
Linuxmint
Openssh
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu