The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-46807

CVE-2025-46807: sslh DoS Vulnerability via Resource Exhaustion

CVE-2025-46807 is a resource allocation vulnerability in sslh that enables attackers to exhaust file descriptors and deny service to legitimate users. This article covers the technical details, affected versions, and mitigation strategies.

Published: May 11, 2026

CVE-2025-46807 Overview

CVE-2025-46807 is a resource exhaustion vulnerability in sslh, the protocol-demultiplexing proxy that routes traffic from a single port to multiple backend services such as HTTPS, SSH, and OpenVPN. The flaw allows unauthenticated remote attackers to exhaust the file descriptors available to the sslh process, denying service to legitimate users. The vulnerability is classified under CWE-770: Allocation of Resources Without Limits or Throttling. It affects all versions of sslh prior to 2.2.4.

Critical Impact

Remote, unauthenticated attackers can trivially exhaust file descriptors in sslh, blocking SSH, HTTPS, and other multiplexed services from reaching legitimate users.

Affected Products

  • sslh versions before 2.2.4
  • Linux distributions packaging vulnerable sslh builds (tracked via SUSE Bugzilla CVE-2025-46807)
  • Any environment using sslh as a front-end multiplexer for SSH, HTTPS, OpenVPN, or similar protocols

Discovery Timeline

  • 2025-06-02 - CVE-2025-46807 published to NVD
  • 2026-04-15 - Last updated in NVD database

Technical Details for CVE-2025-46807

Vulnerability Analysis

sslh listens on a shared port and inspects incoming connections to forward them to the correct backend service based on protocol fingerprints. To perform this inspection, it accepts the TCP connection and holds the socket open while it waits for client data. The vulnerability stems from the absence of any rate limit or cap on the number of concurrent half-open or pending connections that sslh will track. An attacker who opens connections faster than sslh can process them consumes one file descriptor per connection. Once the process reaches the operating system file descriptor limit, accept() calls begin failing and new legitimate clients cannot connect. The EPSS score is 0.385% with a percentile of 59.785, reflecting moderate predicted exploitation activity.

Root Cause

The root cause is missing throttling logic in the connection-handling path of sslh. The daemon allocates a socket descriptor for every inbound TCP connection but does not enforce a per-source or global concurrency ceiling. There is also no timeout aggressive enough to reclaim descriptors held by clients that never send protocol data. This design lets a single host or a small set of hosts consume the entire descriptor pool.

Attack Vector

Exploitation requires only network reachability to the sslh listening port. The attacker opens TCP connections to the proxy and either holds them idle or sends no protocol-identifying bytes. Each lingering connection occupies a file descriptor in the sslh process. Because no authentication is required and the connections do not need to complete a higher-layer handshake, the attack is inexpensive and scriptable with standard tooling such as nc or custom socket loops. The vulnerability does not impact confidentiality or integrity, only availability.

No verified proof-of-concept code is published. The technical mechanism is documented in the GitHub release notes for sslh v2.2.4, which introduces connection limits to address the issue.

Detection Methods for CVE-2025-46807

Indicators of Compromise

  • Sudden spike in concurrent TCP connections to the port hosting sslh (commonly 443 or 22) without matching application-layer traffic
  • sslh log entries reporting accept: Too many open files or EMFILE errors
  • Legitimate SSH or HTTPS clients receiving connection refusals or timeouts while the host remains otherwise reachable
  • Large numbers of ESTABLISHED sockets from a small set of source IPs visible in ss -tn or netstat output

Detection Strategies

  • Monitor the sslh process file descriptor count via /proc/<pid>/fd and alert when it approaches the configured ulimit -n ceiling
  • Correlate connection counts per source IP against historical baselines to flag high-fanout clients
  • Parse sslh stderr and syslog output for repeated accept failures or descriptor allocation errors

Monitoring Recommendations

  • Export socket statistics from front-end hosts to your SIEM or data lake for trend analysis and threshold alerting
  • Track service availability of downstream protocols (SSH, HTTPS) end-to-end so degradation triggered by upstream sslh exhaustion is detected quickly
  • Enable network flow logging at the perimeter to identify source addresses generating abnormal connection volumes to multiplexed ports

How to Mitigate CVE-2025-46807

Immediate Actions Required

  • Upgrade sslh to version 2.2.4 or later on all hosts running the proxy
  • Identify any distribution-packaged sslh builds and apply vendor updates referenced in advisories such as SUSE Bugzilla CVE-2025-46807
  • Restrict inbound access to the sslh listening port with firewall rules where feasible, particularly from untrusted networks

Patch Information

The upstream fix is available in the sslh v2.2.4 release, which adds connection limiting to prevent file descriptor exhaustion. Operators should rebuild or repackage sslh from this release or apply the corresponding distribution update.

Workarounds

  • Raise the nofileulimit for the sslh service unit to increase the attack effort required, while recognizing this is not a fix
  • Place a connection-rate-limiting reverse proxy or stateful firewall in front of sslh to cap concurrent sessions per source IP
  • Use iptables or nftablesconnlimit modules to throttle inbound TCP connections to the multiplexed port
bash
# Example: limit concurrent connections per source IP to the sslh port using iptables
iptables -A INPUT -p tcp --dport 443 --syn \
  -m connlimit --connlimit-above 20 --connlimit-mask 32 \
  -j REJECT --reject-with tcp-reset

# Example: raise file descriptor limit for the sslh systemd service (mitigation only)
mkdir -p /etc/systemd/system/sslh.service.d
cat >/etc/systemd/system/sslh.service.d/limits.conf <<'EOF'
[Service]
LimitNOFILE=65535
EOF
systemctl daemon-reload
systemctl restart sslh

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechSslh

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.39%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-770
  • Technical References
  • SUSE Bugzilla CVE-2025-46807

  • GitHub Release v2.2.4 for sslh
  • Latest CVEs
  • CVE-2026-8468: Elixir Plug Library DoS Vulnerability

  • CVE-2026-8295: simdjson Information Disclosure Vulnerability

  • CVE-2025-68421: Comarch ERP Optima Auth Bypass Vulnerability

  • CVE-2025-68420: Comarch ERP Optima Privilege Escalation
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English