vulnerability

Red Hat: CVE-2025-61985: openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:P)
Published
Oct 6, 2025
Added
Dec 18, 2025
Modified
Feb 3, 2026

Description

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

Solutions

redhat-upgrade-opensshredhat-upgrade-openssh-askpassredhat-upgrade-openssh-askpass-debuginforedhat-upgrade-openssh-cavsredhat-upgrade-openssh-cavs-debuginforedhat-upgrade-openssh-clientsredhat-upgrade-openssh-clients-debuginforedhat-upgrade-openssh-debuginforedhat-upgrade-openssh-debugsourceredhat-upgrade-openssh-keycatredhat-upgrade-openssh-keycat-debuginforedhat-upgrade-openssh-keysignredhat-upgrade-openssh-keysign-debuginforedhat-upgrade-openssh-ldapredhat-upgrade-openssh-ldap-debuginforedhat-upgrade-openssh-serverredhat-upgrade-openssh-server-debuginforedhat-upgrade-openssh-sk-dummy-debuginforedhat-upgrade-pam_ssh_agent_authredhat-upgrade-pam_ssh_agent_auth-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.