CVE-2025-15638
Published: 21 April 2026
Summary
CVE-2025-15638 is a critical-severity an unspecified weakness vulnerability in Atrodo Net\. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-8 (System Component Inventory).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of the vulnerability in Net::Dropbear versions before 0.14 by updating to version 0.14 or later, which addresses the bundled vulnerable libtomcrypt.
Supports identification of CVE-2025-15638 in Net::Dropbear and its bundled Dropbear/libtomcrypt components through regular vulnerability scanning.
Provides an inventory of system components including Net::Dropbear and dependencies to assess exposure to the vulnerable libtomcrypt versions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated RCE in public-facing SSH (Dropbear) service directly enables exploitation of exposed applications and remote services.
NVD Description
Net::Dropbear versions before 0.14 for Perl contains a vulnerable version of libtomcrypt. Net::Dropbear versions before 0.14 includes versions of Dropbear 2019.78 or earlier. These include versions of libtomcrypt v1.18.1 or earlier, which is affected by CVE-2016-6129 and CVE-2018-12437.
Deeper analysisAI
CVE-2025-15638 is a vulnerability in Net::Dropbear versions before 0.14 for Perl, which bundles vulnerable versions of Dropbear 2019.78 or earlier. These in turn include libtomcrypt v1.18.1 or earlier, affected by CVE-2016-6129 and CVE-2018-12437.
The vulnerability has a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating it can be exploited remotely by unauthenticated attackers over the network with low attack complexity and no user interaction. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability with a change in scope.
Advisories recommend updating to Net::Dropbear version 0.14 or later, which addresses the bundled vulnerable libtomcrypt versions, as detailed in the release changes on MetaCPAN. Additional details on the underlying issues are available in the CVE-2016-6129 and CVE-2018-12437 records.
Details
- CWE(s)