CVE-2025-4658
📋 TL;DR
This vulnerability allows attackers to bypass signature verification in OpenPubkey library by crafting malicious JWS tokens. This authentication bypass also affects OPKSSH, potentially allowing unauthorized SSH access. Organizations using OpenPubkey library versions before 0.10.0 or OPKSSH versions before 0.5.0 are affected.
💻 Affected Systems
- OpenPubkey library
- OPKSSH
📦 What is this software?
Openpubkey by Openpubkey
Opkssh by Openpubkey
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of SSH authentication allowing unauthorized access to all systems using vulnerable OPKSSH configurations, potentially leading to full system takeover and data exfiltration.
Likely Case
Unauthorized SSH access to vulnerable systems, enabling privilege escalation, lateral movement, and data theft.
If Mitigated
Limited impact if systems are behind firewalls, use additional authentication factors, or have strict network segmentation.
🎯 Exploit Status
Exploitation requires crafting malicious JWS tokens but does not require authentication to the target system.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: OpenPubkey 0.10.0+, OPKSSH 0.5.0+
Vendor Advisory: https://github.com/openpubkey/opkssh
Restart Required: Yes
Instructions:
1. Update OpenPubkey library to version 0.10.0 or higher. 2. Update OPKSSH to version 0.5.0 or higher. 3. Restart any services using these libraries.
🔧 Temporary Workarounds
Disable OPKSSH authentication
allTemporarily disable OPKSSH authentication and use alternative SSH authentication methods
# Edit SSH configuration to disable OPKSSH
# Use traditional SSH key authentication instead
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable systems
- Enable multi-factor authentication for SSH access
🔍 How to Verify
Check if Vulnerable:
Check installed versions: pip show openpubkey for Python installations or check package manager for system packages
Check Version:
pip show openpubkey | grep Version
Verify Fix Applied:
Verify OpenPubkey version is >=0.10.0 and OPKSSH version is >=0.5.0
📡 Detection & Monitoring
Log Indicators:
- Failed SSH authentication attempts followed by successful OPKSSH authentication
- Unusual SSH connections from unexpected sources
Network Indicators:
- SSH connections using OPKSSH protocol from unauthorized IPs
SIEM Query:
source="ssh.log" AND (opkssh OR openpubkey) AND auth_success=true