<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Libssh — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/libssh/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 07:16:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/libssh/feed.xml" rel="self" type="application/rss+xml"/><item><title>Libssh Denial-of-Service Vulnerability via Inefficient Regular Expression Processing (CVE-2026-0967)</title><link>https://feed.craftedsignal.io/briefs/2024-01-libssh-dos/</link><pubDate>Fri, 01 May 2026 07:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-libssh-dos/</guid><description>CVE-2026-0967 is a denial-of-service vulnerability in libssh, stemming from inefficient regular expression processing that could lead to defense evasion and impact availability on affected systems.</description><content:encoded><![CDATA[<p>CVE-2026-0967 is a denial-of-service (DoS) vulnerability affecting libssh, a library implementing the SSH protocol. The root cause lies in the inefficient processing of regular expressions within the library&rsquo;s code. An attacker could exploit this vulnerability by sending specially crafted input that triggers excessive resource consumption during regular expression matching, leading to a denial of service. Successful exploitation could potentially enable defense evasion by overwhelming security controls and negatively impacting the availability of systems relying on the vulnerable libssh library. The vulnerability affects both Linux and Windows platforms where libssh is used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a service or application utilizing a vulnerable version of libssh.</li>
<li>The attacker crafts a malicious input string designed to trigger inefficient regular expression processing within libssh.</li>
<li>The attacker sends the crafted input to the vulnerable service via a network connection (e.g., SSH).</li>
<li>The libssh library attempts to process the malicious input using its regular expression engine.</li>
<li>The inefficient regular expression causes excessive CPU consumption or memory allocation.</li>
<li>The vulnerable service becomes unresponsive due to resource exhaustion, leading to a denial-of-service condition.</li>
<li>Subsequent legitimate requests to the service are blocked or delayed, further exacerbating the impact.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0967 can result in a denial-of-service condition, rendering affected services or applications unavailable. The impact scope depends on the role of the affected system. For example, a critical server becoming unavailable could disrupt business operations. While the number of potential victims is unknown, any system utilizing a vulnerable version of libssh is susceptible. The defense evasion aspect could allow attackers to bypass security controls during the DoS.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify systems using libssh and determine the installed version.</li>
<li>Apply available patches or updates for libssh to remediate CVE-2026-0967 as released by Microsoft.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Libssh Regex Processing&rdquo; to monitor for potential exploitation attempts.</li>
<li>Monitor CPU and memory usage on systems running libssh for unusual spikes, which may indicate a DoS attack.</li>
<li>Implement rate limiting on services using libssh to mitigate the impact of DoS attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>libssh</category><category>CVE-2026-0967</category><category>defense-evasion</category></item><item><title>Multiple Vulnerabilities in libssh Allow File Manipulation and DoS</title><link>https://feed.craftedsignal.io/briefs/2026-04-libssh-vulns/</link><pubDate>Thu, 16 Apr 2026 10:29:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-libssh-vulns/</guid><description>Multiple vulnerabilities in libssh allow an attacker to manipulate files or cause a denial-of-service condition, potentially leading to data corruption or service disruption.</description><content:encoded><![CDATA[<p>The libssh library, a widely used implementation of the SSH protocol, contains several vulnerabilities that could be exploited by a malicious actor. These vulnerabilities could allow an attacker to manipulate files on a system utilizing the vulnerable library, or cause a denial-of-service (DoS) condition, rendering the system or service unavailable. Given the widespread use of libssh in various applications and systems, these vulnerabilities pose a significant risk to organizations relying on this library for secure communication. The impact ranges from unauthorized data modification to complete service outages, impacting availability and data integrity. Publicly available exploit code may exist, increasing the likelihood of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a system using a vulnerable version of libssh.</li>
<li>The attacker establishes an SSH connection to the target system.</li>
<li>The attacker exploits a vulnerability in libssh related to file handling (specific CVE details unavailable from provided source), potentially through crafted SSH commands.</li>
<li>Successful exploitation allows the attacker to modify arbitrary files on the system, potentially including configuration files or application data.</li>
<li>Alternatively, the attacker exploits a vulnerability related to resource management within libssh to trigger a denial-of-service.</li>
<li>This DoS is achieved by sending a specific sequence of SSH requests that consume excessive resources, such as memory or CPU time.</li>
<li>The targeted service becomes unresponsive, preventing legitimate users from accessing it.</li>
<li>The attacker maintains the DoS condition, disrupting the target&rsquo;s operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these libssh vulnerabilities can have severe consequences. File manipulation could lead to data corruption, unauthorized access, or system compromise. A denial-of-service attack could disrupt critical services, leading to financial losses, reputational damage, and operational downtime. The number of potential victims is vast, considering the widespread use of libssh in servers, network devices, and embedded systems. The targeted systems and sectors are not specified in the source material.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement network monitoring to detect unusual SSH traffic patterns that may indicate exploitation attempts (review existing firewall and network connection logs).</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousSSHClientVersion</code> to identify potentially malicious SSH clients connecting to your systems.</li>
<li>Monitor systems for unexpected file modifications, focusing on configuration files and application data (enable file integrity monitoring).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libssh</category><category>vulnerability</category><category>dos</category><category>file_manipulation</category></item><item><title>libssh Insecure Configuration Allows Local MITM Attacks (CVE-2025-14821)</title><link>https://feed.craftedsignal.io/briefs/2026-04-libssh-mitm/</link><pubDate>Tue, 07 Apr 2026 17:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-libssh-mitm/</guid><description>CVE-2025-14821 in libssh allows local man-in-the-middle attacks, SSH downgrade attacks, and trusted host manipulation due to insecure default configuration loading from a world-writable directory on Windows.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2025-14821, has been identified in the libssh library. This flaw arises from an insecure default configuration on Windows systems. Specifically, libssh automatically loads configuration files from the <code>C:\etc</code> directory. Critically, this directory can be created and modified by unprivileged local users. This allows a malicious local user to manipulate the SSH configuration, facilitating man-in-the-middle attacks, downgrading connection security, and manipulating trusted host information. Successful exploitation grants attackers the ability to intercept and potentially modify SSH communications, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates the directory <code>C:\etc</code> if it does not already exist.</li>
<li>Attacker creates a malicious SSH configuration file (e.g., <code>ssh_config</code>) within the <code>C:\etc</code> directory. This configuration can specify settings to downgrade encryption or redirect connections.</li>
<li>A legitimate user initiates an SSH connection using an application that leverages the vulnerable libssh library.</li>
<li>libssh automatically loads the attacker-controlled configuration file from <code>C:\etc\ssh_config</code>.</li>
<li>The malicious configuration settings are applied, potentially downgrading the encryption algorithm used for the SSH connection.</li>
<li>The attacker intercepts the SSH traffic, performing a man-in-the-middle attack due to the weakened encryption or connection redirection.</li>
<li>The attacker can now eavesdrop on or modify the SSH communication, gaining unauthorized access to sensitive information or injecting malicious commands.</li>
<li>Attacker maintains persistent access or exfiltrates sensitive data obtained through the compromised SSH session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-14821 allows a local attacker to perform man-in-the-middle attacks on SSH connections. This can lead to the compromise of sensitive data transmitted over SSH, such as credentials, configuration files, or confidential documents. The ability to manipulate trusted host information further exacerbates the risk, potentially allowing attackers to impersonate legitimate servers. The vulnerability affects any Windows system using a vulnerable version of libssh and could impact organizations across all sectors that rely on SSH for secure communication and remote administration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation or modification of files within the <code>C:\etc</code> directory, particularly configuration files like <code>ssh_config</code>, using file integrity monitoring (FIM) rules on Windows systems.</li>
<li>Implement the Sigma rule provided to detect the creation of the <code>C:\etc</code> directory by non-system processes.</li>
<li>Restrict write access to the <code>C:\etc</code> directory and its contents using appropriate file system permissions on Windows systems.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libssh</category><category>mitm</category><category>windows</category><category>cve-2025-14821</category><category>insecure-configuration</category></item></channel></rss>