Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26465: Detection of Error Condition Without Action

0
Medium
VulnerabilityCVE-2025-26465cvecve-2025-26465
Published: Tue Feb 18 2025 (02/18/2025, 18:27:16 UTC)
Source: CVE

Description

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:16:35 UTC

Technical Analysis

CVE-2025-26465 is a vulnerability identified in OpenSSH version 6.8p1 that arises when the VerifyHostKeyDNS option is enabled. This option instructs the SSH client to verify the server's host key using DNS records, adding an additional layer of security. However, the vulnerability stems from OpenSSH's improper handling of error codes during this verification process. Specifically, when certain error conditions occur, OpenSSH fails to take appropriate action, allowing a malicious actor to impersonate a legitimate SSH server in a machine-in-the-middle (MitM) attack scenario. The attacker must first induce a state where the client's memory resources are exhausted, which increases the attack complexity significantly. This memory exhaustion likely causes the client to mishandle verification errors, enabling the attacker to bypass host key validation. The vulnerability impacts confidentiality and integrity by potentially exposing sensitive data and allowing unauthorized command execution or data manipulation during SSH sessions. Availability is not directly affected. The CVSS 3.1 base score is 6.8, reflecting network attack vector, high attack complexity, no privileges required, required user interaction, unchanged scope, and high impact on confidentiality and integrity. No public exploits are known at this time, and no patches have been linked yet. The vulnerability was reserved and published in February 2025, with Red Hat as the assigner, indicating vendor awareness and likely forthcoming fixes.

Potential Impact

For European organizations, this vulnerability poses a significant risk to secure remote access and system administration, as OpenSSH is widely used across enterprises, government agencies, and critical infrastructure. Successful MitM attacks could lead to credential theft, unauthorized access, and data exfiltration, undermining confidentiality and integrity of communications. Organizations with high-value assets, such as financial institutions, healthcare providers, and energy sector operators, could face severe operational and reputational damage. The requirement for memory exhaustion as a precondition raises the attack complexity, somewhat limiting widespread exploitation but not eliminating risk, especially from sophisticated threat actors. The lack of availability impact reduces immediate operational disruption but does not diminish the threat to data security. European entities relying on DNS-based host key verification are particularly vulnerable, especially if they have not disabled VerifyHostKeyDNS or implemented compensating controls. The absence of known exploits provides a window for proactive mitigation.

Mitigation Recommendations

1. Immediately disable the VerifyHostKeyDNS option in OpenSSH client configurations unless absolutely necessary, as this is the root cause of the vulnerability. 2. Monitor and limit client memory usage to prevent exhaustion scenarios that enable exploitation. 3. Apply vendor patches as soon as they become available; track updates from OpenSSH and major Linux distributions. 4. Implement network-level protections such as DNSSEC to secure DNS responses and reduce the risk of DNS spoofing. 5. Employ multi-factor authentication and additional layers of verification for SSH access to mitigate potential credential compromise. 6. Conduct regular audits of SSH configurations and logs to detect anomalous connection attempts or MitM indicators. 7. Educate users on the risks of interacting with untrusted SSH servers and the importance of verifying host keys manually if needed. 8. Use intrusion detection systems capable of identifying unusual SSH traffic patterns or memory exhaustion attempts. 9. For critical systems, consider alternative secure remote access methods until the vulnerability is fully mitigated. 10. Coordinate with DNS providers and infrastructure teams to ensure DNS integrity and resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-02-10T18:31:47.978Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe62

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 1/30/2026, 8:16:35 AM

Last updated: 2/3/2026, 1:40:04 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats