First published: Mon Feb 10 2025(Updated: )
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssh | <=1:8.4p1-5+deb11u3<=1:9.2p1-2+deb12u4<=1:9.9p1-3 | 1:8.4p1-5+deb11u4 1:9.2p1-2+deb12u5 1:9.9p2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26465 has a critical severity level due to the potential for a machine-in-the-middle attack.
To fix CVE-2025-26465, upgrade to OpenSSH versions 1:8.4p1-5+deb11u4, 1:9.2p1-2+deb12u5, or 1:9.9p2-1.
CVE-2025-26465 affects OpenSSH versions up to 1:8.4p1-5+deb11u3, 1:9.2p1-2+deb12u4, and 1:9.9p1-3.
Yes, CVE-2025-26465 can allow an attacker to impersonate a legitimate server, potentially leading to unauthorized access.
After applying the fix for CVE-2025-26465, using OpenSSH with VerifyHostKeyDNS enabled is considered safe.