The flaw could be exploited under certain conditions, allowing an attacker with control over a guest VM to deduce the SSH private key.