CVE-2025-14282

Published Feb 12, 2026

Last updated a month ago

CVSS medium 5.4
Dropbear SSH

Overview

Description
A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote client as root, only switching to the logged-in user upon spawning a shell or performing some operations like reading the user's files. With the recent ability of also using unix domain sockets as the forwarding destination any user able to log in via ssh can connect to any unix socket with the root's credentials, bypassing both file system restrictions and any SO_PEERCRED / SO_PASSCRED checks performed by the peer.
Source
patrick@puiterwijk.org
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
5.4
Impact score
2.5
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Severity
MEDIUM

Weaknesses

patrick@puiterwijk.org
CWE-266

Social media

Hype score
Not currently trending
  1. CVE-2025-14282 A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote cl… https://t.co/nrdCuFl6ri

    @CVEnew

    12 Feb 2026

    245 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. oss-sec: [CVE-2025-14282] dropbear: privilege escalation via unix domain socket forwardings https://t.co/1WjWgLHpKM #cyber #threathunting #infosec

    @blueteamsec1

    21 Jan 2026

    385 Impressions

    1 Retweet

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  3. Technical deep dive: #Debian's DSA 6086-1 for Dropbear (CVE-2025-14282). This isn't just a patch alert. It's a case study in memory safety flaws in lightweight SSH daemons and a springboard for discussing. Read more: 👉 https://t.co/2sw1uVH7JP #Security https://t.co/69YUGj

    @Cezar_H_Linux

    29 Dec 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. CVE-2025-14282: Dropbear: privilege escalation via unix domain socket forwardings https://t.co/rr7q2DNnsF User able to log in via ssh can connect to any unix socket as root, bypassing both filesystem restrictions and SO_PEERCRED checks. Could be used to get a root shell.

    @oss_security

    26 Dec 2025

    7011 Impressions

    21 Retweets

    80 Likes

    45 Bookmarks

    1 Reply

    0 Quotes

  5. #exploit 1⃣. CVE-2025-31200, CVE-2025-31201: https://t.co/l1YEKl5Wn9 iMessage Zero‑Click RCE Chain 2⃣. CVE-2025-14282: https://t.co/xhWFlsnWsq Dropbear - privilege escalation via Unix domain socket forwarding 3⃣. CVE-2025-66224: https://t.co/BFGbZnVKgE OrangeHRM RCE 4

    @ksg93rd

    21 Dec 2025

    12696 Impressions

    68 Retweets

    235 Likes

    160 Bookmarks

    0 Replies

    0 Quotes