pull down to refresh

Two critical vulnerabilities in sslh, a popular protocol demultiplexer that allows multiple services to share the same network port.

The flaws tracked as CVE-2025-46807 and CVE-2025-46806 could be exploited remotely to trigger denial-of-service (DoS) attacks.

The vulnerabilities affect sslh versions prior to v2.2.4, with fixes now available in the latest release.

Apart from the mitigation measures included in the post I would also recommend:

  • Restrict access to ports handled by sslh using a firewall or access control lists.
  • Monitor for unusual or malformed connection attempts using tools like tcpdump, fail2ban, or Zeek.
reply