<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2025-14821 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2025-14821/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 17:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2025-14821/feed.xml" rel="self" type="application/rss+xml"/><item><title>libssh Insecure Configuration Allows Local MITM Attacks (CVE-2025-14821)</title><link>https://feed.craftedsignal.io/briefs/2026-04-libssh-mitm/</link><pubDate>Tue, 07 Apr 2026 17:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-libssh-mitm/</guid><description>CVE-2025-14821 in libssh allows local man-in-the-middle attacks, SSH downgrade attacks, and trusted host manipulation due to insecure default configuration loading from a world-writable directory on Windows.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2025-14821, has been identified in the libssh library. This flaw arises from an insecure default configuration on Windows systems. Specifically, libssh automatically loads configuration files from the <code>C:\etc</code> directory. Critically, this directory can be created and modified by unprivileged local users. This allows a malicious local user to manipulate the SSH configuration, facilitating man-in-the-middle attacks, downgrading connection security, and manipulating trusted host information. Successful exploitation grants attackers the ability to intercept and potentially modify SSH communications, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates the directory <code>C:\etc</code> if it does not already exist.</li>
<li>Attacker creates a malicious SSH configuration file (e.g., <code>ssh_config</code>) within the <code>C:\etc</code> directory. This configuration can specify settings to downgrade encryption or redirect connections.</li>
<li>A legitimate user initiates an SSH connection using an application that leverages the vulnerable libssh library.</li>
<li>libssh automatically loads the attacker-controlled configuration file from <code>C:\etc\ssh_config</code>.</li>
<li>The malicious configuration settings are applied, potentially downgrading the encryption algorithm used for the SSH connection.</li>
<li>The attacker intercepts the SSH traffic, performing a man-in-the-middle attack due to the weakened encryption or connection redirection.</li>
<li>The attacker can now eavesdrop on or modify the SSH communication, gaining unauthorized access to sensitive information or injecting malicious commands.</li>
<li>Attacker maintains persistent access or exfiltrates sensitive data obtained through the compromised SSH session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-14821 allows a local attacker to perform man-in-the-middle attacks on SSH connections. This can lead to the compromise of sensitive data transmitted over SSH, such as credentials, configuration files, or confidential documents. The ability to manipulate trusted host information further exacerbates the risk, potentially allowing attackers to impersonate legitimate servers. The vulnerability affects any Windows system using a vulnerable version of libssh and could impact organizations across all sectors that rely on SSH for secure communication and remote administration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation or modification of files within the <code>C:\etc</code> directory, particularly configuration files like <code>ssh_config</code>, using file integrity monitoring (FIM) rules on Windows systems.</li>
<li>Implement the Sigma rule provided to detect the creation of the <code>C:\etc</code> directory by non-system processes.</li>
<li>Restrict write access to the <code>C:\etc</code> directory and its contents using appropriate file system permissions on Windows systems.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libssh</category><category>mitm</category><category>windows</category><category>cve-2025-14821</category><category>insecure-configuration</category></item></channel></rss>