First published: Mon Feb 10 2025(Updated: )
The OpenSSH client is vulnerable to an active machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (it is disabled by default): when a vulnerable client connects to a server, an active machine-in-the-middle can impersonate the server by completely bypassing the client's checks of the server's identity.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2344780 is classified as high due to its potential for an active machine-in-the-middle attack.
REDHAT-BUG-2344780 affects OpenSSH clients by allowing an active machine-in-the-middle to impersonate the server when the VerifyHostKeyDNS option is enabled.
To fix REDHAT-BUG-2344780, disable the VerifyHostKeyDNS option in the OpenSSH client configuration if it is enabled.
All versions of the OpenSSH client that have the VerifyHostKeyDNS option enabled are vulnerable to REDHAT-BUG-2344780.
No, the VerifyHostKeyDNS option is disabled by default in OpenSSH clients.