PatchSiren cyber security CVE debrief
CVE-2026-0965 Redhat CVE debrief
CVE-2026-0965 is a low-severity local denial-of-service issue in libssh. During configuration parsing, affected versions may attempt to open arbitrary files. In misconfigured deployments or when a malicious configuration file is provided, this can cause the system to access sensitive targets such as block devices or large system files and disrupt normal operation.
- Vendor
- Redhat
- Product
- Unknown
- CVSS
- LOW 3.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-26
- Original CVE updated
- 2026-05-19
- Advisory published
- 2026-03-26
- Advisory updated
- 2026-05-19
Who should care
Administrators and application teams that deploy libssh, especially where configuration files may be user-controlled or where the library is packaged in Red Hat Enterprise Linux environments. Security teams managing Red Hat errata and embedded libssh dependencies should also review exposure.
Technical summary
NVD lists libssh versions through 0.11.3 as vulnerable and maps the issue to CWE-73 (External Control of File Name or Path). The CVSS v3.0 vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, indicating a local attack with low privileges and availability impact only. The reported behavior is arbitrary file opening during configuration parsing, which can lead to DoS when dangerous files are accessed.
Defensive priority
Low
Recommended defensive actions
- Apply vendor fixes and update affected libssh packages beyond the vulnerable range reported by NVD (through 0.11.3).
- Review any workflows that allow untrusted or attacker-influenced configuration files and stop them from reaching libssh parsing paths.
- Limit local access and follow least-privilege practices for services that use libssh.
- Check Red Hat advisories and errata for the applicable platform packages and confirm remediation is installed.
- Monitor for abnormal file-access errors or service instability around configuration parsing, especially on systems handling custom configs.
Evidence notes
The supplied official data shows CVE publication on 2026-03-26 and a later NVD modification on 2026-05-19. NVD marks libssh as vulnerable through 0.11.3 and includes Red Hat Enterprise Linux 9.0 and 10.0 CPE entries. The mapped weakness is CWE-73, and the CVSS vector indicates a local, low-privilege availability issue. Red Hat references include RHSA-2026:18160, RHSA-2026:18683, a Red Hat CVE page, and a Bugzilla record. No KEV listing or ransomware linkage was provided in the source corpus.
Official resources
-
CVE-2026-0965 CVE record
CVE.org
-
CVE-2026-0965 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Published by NVD/CVE on 2026-03-26T21:17:00.607Z and last modified on 2026-05-19T14:16:33.803Z. No KEV entry was present in the supplied data.