6.8

CVE-2025-26465

Media report

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

Data is provided by the National Vulnerability Database (NVD)
OpenbsdOpenssh Version >= 6.9 <= 9.8
OpenbsdOpenssh Version6.8 Updatep1
OpenbsdOpenssh Version9.9 Update-
OpenbsdOpenssh Version9.9 Updatep1
NetappActive Iq Unified Manager Version- SwPlatformvmware_vsphere
NetappOntap Version9
DebianDebian Linux Version11.0
DebianDebian Linux Version12.0
RedhatEnterprise Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 58.35% 0.981
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 1.6 5.2
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
secalert@redhat.com 6.8 1.6 5.2
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CWE-390 Detection of Error Condition Without Action

The product detects a specific error, but takes no actions to handle the error.

https://bugzilla.redhat.com/show_bug.cgi?id=2344780
Third Party Advisory
Issue Tracking
https://seclists.org/oss-sec/2025/q1/144
Third Party Advisory
Mailing List