Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26465: Detection of Error Condition Without Action

0
Medium
VulnerabilityCVE-2025-26465cvecve-2025-26465
Published: Tue Feb 18 2025 (02/18/2025, 18:27:16 UTC)
Source: CVE

Description

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:38:22 UTC

Technical Analysis

CVE-2025-26465 is a vulnerability identified in OpenSSH version 6.8p1 that arises when the VerifyHostKeyDNS option is enabled. This option allows OpenSSH clients to verify the server's host key using DNS records, enhancing security by validating the server's identity. However, due to improper handling of error conditions during the host key verification process, OpenSSH fails to take appropriate action when certain errors occur. Specifically, the software mishandles error codes, which can be exploited by a malicious actor controlling a machine positioned between the client and the legitimate server (a machine-in-the-middle attack). The attacker can impersonate the legitimate server by exploiting this flaw, potentially intercepting or altering communications. A critical prerequisite for this attack is that the attacker must first exhaust the client's memory resources, which increases the attack complexity and reduces the likelihood of widespread exploitation. The vulnerability affects confidentiality and integrity by enabling unauthorized interception and modification of SSH sessions but does not impact availability. The CVSS 3.1 score of 6.8 reflects a network attack vector with high complexity, no privileges required, user interaction needed, and significant confidentiality and integrity impacts. No patches or exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

The primary impact of CVE-2025-26465 is the potential compromise of confidentiality and integrity of SSH sessions when VerifyHostKeyDNS is enabled. Successful exploitation allows an attacker to impersonate legitimate SSH servers, enabling interception and manipulation of sensitive data transmitted over SSH connections. This can lead to credential theft, unauthorized command execution, and data exfiltration. Although the attack complexity is high due to the need to exhaust client memory resources, targeted attacks against high-value assets remain a concern. Organizations relying on OpenSSH for secure remote access, especially those using DNS-based host key verification, face increased risk of MitM attacks. The vulnerability does not affect system availability directly but undermines trust in SSH communications, potentially disrupting secure administrative operations and automated processes. The absence of known exploits in the wild suggests limited current threat but does not preclude future exploitation as attackers develop techniques to overcome the memory exhaustion requirement.

Mitigation Recommendations

To mitigate CVE-2025-26465, organizations should first verify if the VerifyHostKeyDNS option is enabled in their OpenSSH client configurations and consider disabling it if not strictly necessary. Disabling this option removes the vulnerable code path and reduces exposure. If DNS-based host key verification is required, ensure that DNSSEC is properly implemented and validated to reduce reliance on potentially spoofed DNS responses. Monitor client memory usage and implement resource limits to prevent exhaustion attacks. Upgrade OpenSSH to a version where this vulnerability is patched once available; until then, apply any vendor-provided workarounds or patches. Employ network-level protections such as SSH bastion hosts, VPNs, or strict firewall rules to limit exposure to untrusted networks. Educate users to recognize suspicious SSH connection warnings and enforce strict host key verification policies. Regularly audit SSH configurations and logs for anomalies indicating potential MitM attempts. Consider deploying intrusion detection systems capable of identifying unusual SSH traffic patterns.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-02-10T18:31:47.978Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe62

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/27/2026, 12:38:22 PM

Last updated: 3/28/2026, 9:18:04 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses