First published: Wed Feb 26 2025(Updated: )
SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Go Crypto | ||
go/golang.org/x/crypto | <0.35.0 | 0.35.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22869 is classified as a denial of service vulnerability.
To mitigate CVE-2025-22869, ensure that your SSH server implementations are updated to the latest versions that address this vulnerability.
CVE-2025-22869 is caused by clients completing the key exchange slowly, leading to pending content being read into memory without transmission.
CVE-2025-22869 affects SSH servers that implement file transfer protocols, specifically those using the Go crypto package.
The potential impact of CVE-2025-22869 includes denial of service, where excessive memory usage can disrupt service availability.