A vulnerability was found in wolfSSH's server-side state machine before versions 1.4.17. A malicious client could create channels without first performing user authentication, resulting in unauthorized access.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssh/pull/670 | Issue Tracking |
| https://github.com/wolfSSL/wolfssh/pull/671 | Issue Tracking |
| https://www.wolfssl.com/docs/security-vulnerabilities/ | Vendor Advisory |
| https://github.com/wolfSSL/wolfssh/pull/670 | Issue Tracking |
| https://github.com/wolfSSL/wolfssh/pull/671 | Issue Tracking |
| https://www.wolfssl.com/docs/security-vulnerabilities/ | Vendor Advisory |
Configurations
History
05 Dec 2025, 20:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wolfssh:wolfssh:*:*:*:*:*:*:*:* | |
| References | () https://github.com/wolfSSL/wolfssh/pull/670 - Issue Tracking | |
| References | () https://github.com/wolfSSL/wolfssh/pull/671 - Issue Tracking | |
| References | () https://www.wolfssl.com/docs/security-vulnerabilities/ - Vendor Advisory | |
| First Time |
Wolfssh
Wolfssh wolfssh |
21 Nov 2024, 09:10
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/wolfSSL/wolfssh/pull/670 - | |
| References | () https://github.com/wolfSSL/wolfssh/pull/671 - | |
| References | () https://www.wolfssl.com/docs/security-vulnerabilities/ - |
25 Mar 2024, 22:37
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-03-25 22:37
Updated : 2025-12-05 20:09
NVD link : CVE-2024-2873
Mitre link : CVE-2024-2873
CVE.ORG link : CVE-2024-2873
JSON object : View
Products Affected
wolfssh
- wolfssh
CWE
CWE-287
Improper Authentication
