OpenSSH security update (CVE-2025-61984)
36924
19 February 2026
04 February 2026
CLOSED
MEDIUM
3.6
CVE-2025-61984
|
Brocade Security Advisory ID |
BSA-2026-3165 |
|
Component |
OpenSSH |
|
|
|
Summary
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
Products Affected
- Brocade ASCG before 3.4.0
Products Not Affected
- Brocade SANnav
[VEX Justification: Vulnerable_code_not_in_execute_path] - Brocade Fabric OS
[VEX Justification: Vulnerable_code_not_in_execute_path]
Solution
- Security update provided in Brocade ASCG 3.4.0
Credit
The issue was discovered during internal testing.
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
February 19, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.