The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-30095

CVE-2025-30095: VyOS Dropbear SSH Key Disclosure Flaw

CVE-2025-30095 is an information disclosure vulnerability in VyOS affecting versions 1.3 through 1.5. Identical Dropbear SSH host keys enable man-in-the-middle attacks. This article covers technical details, affected systems, and mitigation.

Published: March 24, 2026

CVE-2025-30095 Overview

CVE-2025-30095 is a critical cryptographic vulnerability affecting VyOS versions 1.3 through 1.5 and potentially any Debian-based system using Dropbear SSH in combination with live-build. The vulnerability stems from hardcoded private host keys that are identical across different installations, enabling active man-in-the-middle attacks against SSH connections when Dropbear is enabled as the SSH daemon.

Critical Impact

Attackers can conduct man-in-the-middle attacks against SSH connections, potentially intercepting, modifying, or injecting malicious commands into encrypted SSH sessions across any affected VyOS installation.

Affected Products

  • VyOS 1.3 through 1.5 (fixed in 1.4.2)
  • Any Debian-based system using Dropbear with live-build
  • VyOS console service (default configuration)

Discovery Timeline

  • 2025-03-31 - CVE CVE-2025-30095 published to NVD
  • 2025-04-11 - Last updated in NVD database

Technical Details for CVE-2025-30095

Vulnerability Analysis

This vulnerability is classified under CWE-321 (Use of Hard-coded Cryptographic Key), representing a fundamental cryptographic security flaw. The issue affects network-accessible systems where the attack can be executed without authentication or user interaction. The scope is changed, meaning successful exploitation can impact resources beyond the vulnerable component, potentially compromising the confidentiality, integrity, and availability of connected systems and data traversing the SSH connection.

In VyOS, while Dropbear is not the default SSH daemon for the main system SSH service, it is the default configuration for the console service, making this a significant security concern for administrators who may be unaware of the exposure.

Root Cause

The root cause lies in the build process for Debian-based live images. When using live-build in combination with Dropbear, the private host keys generated during the image creation process are embedded directly into the release image. Unlike OpenSSH, which has safeguards against this behavior in the live-build process, Dropbear lacks equivalent protection mechanisms. This results in every installation from the same image sharing identical private SSH host keys.

Attack Vector

The attack vector is network-based, requiring the attacker to position themselves in the network path between a legitimate user and the VyOS device running Dropbear. Since all vulnerable installations share the same private host keys, an attacker with knowledge of these keys can:

  1. Intercept SSH connection attempts by impersonating the target VyOS device
  2. Decrypt SSH traffic using the known private key
  3. Potentially inject commands or exfiltrate sensitive data
  4. Forward traffic to the actual target while maintaining the man-in-the-middle position

The vulnerability requires high attack complexity as the attacker must achieve a privileged network position, but no user interaction or authentication is required for exploitation.

Detection Methods for CVE-2025-30095

Indicators of Compromise

  • Unexpected SSH connection warnings or certificate/key changes on client systems
  • Network traffic anomalies indicating potential man-in-the-middle positioning
  • SSH host key fingerprints matching known compromised keys from default VyOS images
  • Suspicious ARP traffic or DNS responses indicating network-level interception attempts

Detection Strategies

  • Verify SSH host key fingerprints against known-good values established after key regeneration
  • Implement SSH host key pinning on client systems connecting to VyOS devices
  • Monitor for duplicate SSH host key fingerprints across multiple VyOS installations in your environment
  • Review Dropbear key files in /etc/dropbear/ and /etc/dropbear-initramfs/ for creation timestamps matching the image build date

Monitoring Recommendations

  • Configure network monitoring to detect ARP spoofing and other man-in-the-middle indicators
  • Implement SSH certificate authority (CA) based authentication where possible
  • Enable logging of SSH connection attempts and key exchanges on VyOS devices
  • Consider deploying network-based intrusion detection to identify suspicious SSH traffic patterns

How to Mitigate CVE-2025-30095

Immediate Actions Required

  • Regenerate Dropbear host keys immediately on all affected VyOS installations
  • Update to VyOS 1.4.2 or the latest version of VyOS 1.5 (2025 Q1 release)
  • Audit all Debian-based systems using Dropbear with live-build for similar key reuse issues
  • Notify users who connect via SSH to verify new host key fingerprints after regeneration

Patch Information

VyOS has released fixed versions addressing this vulnerability. Administrators should update to VyOS 1.4.2 or later for the 1.4 branch, or download the latest VyOS Stream 1.5 2025-Q1 release. For detailed patch information, refer to the VyOS Project March 2025 Update and the VyOS Issue T7217 tracking this vulnerability.

Workarounds

  • Remove existing Dropbear keys and regenerate them using the commands provided below
  • If Dropbear is not required, disable it and use OpenSSH exclusively for SSH services
  • Implement network segmentation to limit exposure of management interfaces
  • Deploy VPN or other encrypted tunnels for management access to reduce man-in-the-middle risk
bash
# Remove compromised Dropbear keys
rm -f /etc/dropbear/*key*
rm -f /etc/dropbear-initramfs/*key*

# Regenerate secure RSA host key (4096-bit)
dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key

# Reload the Dropbear service or reboot the system
# to apply the new keys before using Dropbear as SSH daemon

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechDropbear

  • SeverityCRITICAL

  • CVSS Score9.0

  • EPSS Probability0.34%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-321
  • Technical References
  • VyOS Project March 2025 Update

  • VyOS Stream 1.5 Q1 2025

  • GitHub VyOS Repository

  • VyOS Issue T7217

  • VyOS Stream 1.5 Download
  • Related CVEs
  • CVE-2026-3706: mkj Dropbear RCE Vulnerability

  • CVE-2025-14282: Dropbear SSH Authentication Bypass Flaw

  • CVE-2026-1803: Ziroom ZHOME A0101 Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English