CVE-2025-26465

Description

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle (MitM) attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client’s memory resource first, turning the attack complexity high.

Mitigation

This issue is rated as a medium severity vulnerability because it requires specific conditions to be exploitable.
First, the OpenSSH client must have the VerifyHostKeyDNS option enabled, which is disabled by default on most systems.
Additionally, while the attack allows a MitM adversary to trick the client into accepting an incorrect host key, it does not directly lead to code execution or immediate system compromise. Instead, the attack requires additional steps, such as credential interception or session hijacking to fully exploit the breach.

CVSS 3.1
Base Score 6.8
Severity Medium
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact None

Affected OpenSSH versions: 6.8p1 to 9.9p1

References