The Qualys Threat Research Unit (TRU) has uncovered two high-severity vulnerabilities in OpenSSH, the widely used suite for secure network communication.
Tracked as CVE-2025-26465 and CVE-2025-26466, these flaws enable machine-in-the-middle (MitM) attacks against clients and pre-authentication denial-of-service (DoS) exploits targeting both clients and servers.
With OpenSSH integral to enterprise infrastructure, these vulnerabilities pose significant risks to data integrity, system availability, and regulatory compliance.
CVE-2025-26465: Machine-in-the-Middle Attack
This vulnerability impacts OpenSSH clients running versions 6.8p1 through 9.9p1 and arises when the VerifyHostKeyDNS
option is enabled.
Though disabled by default, this setting was historically activated in FreeBSD and other configurations, expanding the attack surface. Attackers exploiting this flaw can impersonate legitimate servers by bypassing host key verification, even when DNS SSHFP records are absent.
The attack requires no user interaction, enabling silent interception of SSH sessions. This compromises confidentiality and allows adversaries to steal credentials, manipulate data, or pivot to internal systems.
Qualys emphasizes that the flaw’s 11-year presence (introduced in December 2014) underscores the need for rigorous configuration audits.
CVE-2025-26466: Pre-Authentication DoS Exploit
Affecting OpenSSH versions 9.5p1 through 9.9p1, this vulnerability permits attackers to exhaust server resources via asymmetric CPU/memory consumption. By flooding unauthenticated sessions with SSH2_MSG_PING
packets, adversaries can cripple systems, locking administrators out of critical infrastructure.
While server-side mitigations like LoginGraceTime
and PerSourcePenalties
exist, client-side protections remain unavailable, necessitating immediate patching.
Mitigations
- Upgrade to OpenSSH 9.9p2, which resolves both vulnerabilities[8].
- Disable
VerifyHostKeyDNS
if enabled and enforce strict host key verification via known_hosts files. - Configure server defenses: Reduce
LoginGraceTime
, limit concurrent connections viaMaxStartups
, and applyPerSourcePenalties
to throttle abusive IPs.
The MitM vulnerability undermines SSH’s foundational promise of secure communication, enabling stealthy breaches that evade traditional monitoring. For enterprises, this risks non-compliance with GDPR, HIPAA, and PCI-DSS due to potential data exfiltration.
The DoS vulnerability disrupts business operations by making SSH unavailable. This is a key target for ransomware groups that aim to cause operational outages. The issue with CVE-2025-26466 is that attackers can exploit it without needing to steal credentials, making it easier for them to gain access.
As Qualys notes, OpenSSH’s role in global infrastructure demands unwavering vigilance. Organizations failing to act risk severe financial, legal, and reputational fallout from preventable breaches.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free