CVE-2025-15382
- EPSS 0.13%
- Veröffentlicht 06.01.2026 17:43:44
- Zuletzt bearbeitet 12.01.2026 17:57:20
A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.
CVE-2025-14942
- EPSS 0.06%
- Veröffentlicht 06.01.2026 17:26:30
- Zuletzt bearbeitet 12.01.2026 17:53:19
wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH versi...
CVE-2025-11625
- EPSS 0.11%
- Veröffentlicht 21.10.2025 13:25:18
- Zuletzt bearbeitet 04.12.2025 20:43:02
Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier clients that allows authentication bypass and leaking of clients credentials.
CVE-2025-11624
- EPSS 0.07%
- Veröffentlicht 21.10.2025 13:14:19
- Zuletzt bearbeitet 04.12.2025 21:21:39
Potential stack buffer overwrite on the SFTP server side when receiving a malicious packet that has a handle size larger than the system handle or file descriptor size, but smaller than max handle size allowed.
CVE-2024-2873
- EPSS 0.35%
- Veröffentlicht 25.03.2024 22:37:19
- Zuletzt bearbeitet 05.12.2025 20:09:27
A vulnerability was found in wolfSSH's server-side state machine before versions 1.4.17. A malicious client could create channels without first performing user authentication, resulting in unauthorized access.
CVE-2022-32073
- EPSS 1.34%
- Veröffentlicht 13.07.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 07:05:44
WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR.