CVE-2025-30095

9.0 CRITICAL

📋 TL;DR

This vulnerability allows attackers to conduct man-in-the-middle attacks against SSH connections using Dropbear, as affected systems share identical private host keys across installations. It impacts VyOS 1.3 through 1.5 (fixed in 1.4.2) and potentially any Debian-based Linux distribution using Dropbear with live-build. The console service in VyOS uses Dropbear by default, while the system SSH daemon does not.

💻 Affected Systems

Products:
  • VyOS
  • Debian-based Linux distributions
Versions: VyOS 1.3 through 1.5 (fixed in 1.4.2)
Operating Systems: Linux (Debian-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Default configuration for VyOS console service uses Dropbear; system SSH daemon does not. Any Debian-based system using Dropbear with live-build may be affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept and decrypt SSH traffic, potentially gaining unauthorized access to systems, stealing credentials, and compromising sensitive data.

🟠

Likely Case

Targeted attacks against organizations using vulnerable configurations, leading to credential theft and unauthorized access to network devices.

🟢

If Mitigated

Limited impact if proper key management is implemented or if Dropbear is not used for critical SSH services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept SSH traffic; attackers need to position themselves as man-in-the-middle.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: VyOS 1.4.2 or latest versions of 1.4/1.5

Vendor Advisory: https://blog.vyos.io/vyos-project-march-2025-update

Restart Required: Yes

Instructions:

Update to VyOS 1.4.2 or latest versions of 1.4/1.5. For Debian-based systems, update dropbear and live-build packages to versions with fixes.

🔧 Temporary Workarounds

Regenerate Dropbear Host Keys

linux

Remove existing keys and generate new unique RSA host keys for Dropbear.

rm -f /etc/dropbear/*key*
rm -f /etc/dropbear-initramfs/*key*
dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key

🧯 If You Can't Patch

  • Disable Dropbear SSH daemon and use OpenSSH instead if possible.
  • Implement network segmentation and monitoring to detect man-in-the-middle attacks.

🔍 How to Verify

Check if Vulnerable:

Check if Dropbear is enabled and compare host keys across systems; identical keys indicate vulnerability.

Check Version:

vyos-version (for VyOS) or dpkg -l | grep -E "(dropbear|live-build)" (for Debian-based systems)

Verify Fix Applied:

Verify new unique host keys exist in /etc/dropbear/ and /etc/dropbear-initramfs/, and confirm system is updated to patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected SSH connection failures or warnings about host key mismatches in logs.

Network Indicators:

  • Anomalous network traffic patterns indicative of man-in-the-middle attacks on SSH ports.

SIEM Query:

Example: search for events where SSH host key changes or mismatches are logged across multiple systems.

🔗 References

📤 Share & Export