CVE-2025-26465 — Detection of Error Condition Without Action in Openssh
Severity
6.8MEDIUMNVD
EPSS
73.6%
top 1.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 18
Latest updateAug 12
Description
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 1.6 | Impact: 5.2
Affected Packages3 packages
Also affects: Ontap 9, Debian Linux 11.0, 12.0, Enterprise Linux 9.0, Openshift Container Platform 4.0