OpenSSH Vulnerability (CVE-2025-61984 and CVE-2025-61985) in ESXi 8.0 Update 3e and vCenter Server 8.0 Update 3g
search cancel

OpenSSH Vulnerability (CVE-2025-61984 and CVE-2025-61985) in ESXi 8.0 Update 3e and vCenter Server 8.0 Update 3g

book

Article ID: 415434

calendar_today

Updated On:

Products

VMware vSphere ESXi VMware vCenter Server

Issue/Introduction

CVE-2025-61984 and CVE-2025-61985 (OpenSSH < 10.1 / 10.1p1 RCE) identified on an environment running ESXi 8.0 Update 3e and vCenter Server 8.0 Update 3g

The scan tool recommends upgrading OpenSSH to version 10.1 or later. This document addresses whether this vulnerability affects ESXi and vCenter, and outlines the appropriate remediation path. The finding is related to a vulnerability scan, not a functional service impact. 

  • The CVE in question carries a CVSS score of 3.6 (Low severity)

Both CVEs are client-side vulnerabilities that require the use of the "ProxyCommand" directive in the SSH client configuration to be exploitable.

  • By default, neither VMware ESXi nor vCenter Server uses or configures "ProxyCommand" in their SSH client behavior.
  • ESXi/vCenter does not permit administrators to add "ProxyCommand" to its SSH client configuration. Commands such as "esxcli system ssh" do not support or allow injection of this directive in ESXi
  • If the remote client has OpenSSH 10.1 and/or review their client configuration with no "ProxyCommand" configuration, this can be mitigated.

Environment

vSphere 8.x

Cause

  • The OpenSSH version included with ESXi 8.0 Update 3e and vCenter 8.0 Update 3g is flagged as vulnerable because it is below version 10.1. However, OpenSSH 10.1 has not yet been integrated into the ESXi 8.0 series due to dependency and compatibility constraints across supported components
  • OpenSSH 10.1 is not part of the ESXi 8.0 patch stream, and transitioning to OpenSSH 10.1 would require crossing a major version boundary, which is not permitted within the 8.0 patch series

Resolution

  • No immediate action is required
  • It is recommended to stay current with the latest ESXi 8.0 patches, which will include OpenSSH 9.9p2 in Patch 7
  • The update to OpenSSH 10.1 will be targeted for the next major release. Please refer to the release notes for existing and forthcoming product releases for any updates in relation to this CVE. Should you require further information please contact Broadcom Support

Additional Information

Security findings can be submitted for formal review through: Broadcom Support