PT-2025-40939 · Openbsd +1 · Openssh +1
David Leadbeater
·
Published
2025-10-06
·
Updated
2025-10-16
·
CVE-2025-61984
CVSS v3.1
3.6
3.6
Low
Base vector | Vector | AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
OpenSSH versions prior to 10.1
Description
The software contains a flaw where control characters within usernames originating from untrusted sources can lead to code execution when a
ProxyCommand
is used. Specifically, the issue arises from the unsafe handling of control characters, such as newlines, in usernames. This allows an attacker to inject commands via the ProxyCommand
, potentially achieving remote code execution (RCE) on vulnerable servers. The vulnerability is particularly dangerous because ProxyCommand
is trusted to run shell helpers on connection. Exploitation has been demonstrated using Git submodules to deliver the malicious payload. The vulnerability can be triggered when the ProxyCommand
uses %r
(remote user) and an unpatched version of OpenSSH is in use.Recommendations
Update to OpenSSH version 10.1 or later.
Disable or limit the use of
ProxyCommand
as a temporary mitigation.
Require jump-hosts or bastions to restrict direct access.
Enforce strict AllowUsers
or Match
blocks in the SSH configuration.
Force non-interactive shells for SSH helpers.Exploit
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-61984
Affected Products
Debian
Openssh
References · 44
- 🔥 https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984 · Exploit
- https://security-tracker.debian.org/tracker/source-package/openssh · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-61984 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61984 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-61984 · Security Note
- https://reddit.com/r/CVEWatch/comments/1o16cnb/top_10_trending_cves_08102025 · Reddit Post
- https://t.me/CSIRT_italia/2784 · Telegram Post
- https://reddit.com/r/AlmaLinux/comments/1o28mdo/cve202561984 · Reddit Post
- https://twitter.com/Dinosn/status/1975416200726241499 · Twitter Post
- https://t.me/poxek/5595 · Telegram Post
- https://t.me/RNetsec/22066 · Telegram Post
- https://t.me/purp_sec/1187 · Telegram Post
- https://twitter.com/_r_netsec/status/1975878362460766430 · Twitter Post
- https://reddit.com/r/u_aalejos/comments/1o5xrhl/bash_un_nuevo_cve202561984_que_afecta_a · Reddit Post
- https://twitter.com/CybershieldHub/status/1975460602026803633 · Twitter Post