CVE-2025-26466: Allocation of Resources Without Limits or Throttling
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
AI Analysis
Technical Summary
CVE-2025-26466 is a resource exhaustion vulnerability found in OpenSSH version 9.5p1. The flaw arises because the SSH server allocates a pong packet in memory for each ping packet it receives and queues these packets until the server/client key exchange completes. However, this memory allocation is not limited or throttled, allowing a malicious client to send a continuous stream of ping packets. This causes the server's memory consumption to grow uncontrollably, eventually exhausting available memory resources. The result is a denial of service condition where the SSH server becomes unresponsive or crashes, disrupting remote access and management capabilities. The vulnerability has a CVSS 3.1 base score of 5.9, indicating medium severity, with the vector showing network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved and published in February 2025 and is tracked under CVE-2025-26466. This issue is particularly critical for environments relying heavily on OpenSSH for secure remote administration, as it can be exploited remotely without authentication.
Potential Impact
The primary impact of CVE-2025-26466 is a denial of service condition caused by memory exhaustion on the SSH server. Organizations relying on OpenSSH 9.5p1 for remote access and management could experience service outages, disrupting operational continuity and potentially delaying incident response or system maintenance. This could affect cloud service providers, data centers, enterprise IT environments, and critical infrastructure sectors that depend on SSH for secure communications. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can have cascading effects, including inability to manage systems remotely, increased operational costs, and potential exposure to secondary risks if fallback or emergency access methods are not in place. The attack requires no authentication, making it accessible to any remote attacker with network access to the SSH server, although the high attack complexity may limit widespread exploitation. The absence of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2025-26466, organizations should first apply any official patches or updates released by the OpenSSH maintainers addressing this vulnerability. If patches are not yet available, administrators can implement rate limiting or connection throttling at the network level using firewalls or intrusion prevention systems to restrict the frequency of ping packets or SSH connection attempts from individual IP addresses. Configuring SSH server parameters to limit resource allocation or queue sizes related to ping/pong packets may also help, if supported. Monitoring SSH server memory usage and setting up alerts for abnormal consumption patterns can enable early detection of exploitation attempts. Additionally, deploying network segmentation to restrict SSH access to trusted networks and using VPNs or jump hosts can reduce exposure. Regularly reviewing and updating SSH server configurations to disable unnecessary features or reduce attack surface is recommended. Finally, maintaining comprehensive incident response plans that include recovery procedures for SSH service outages will improve resilience.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, Australia, Canada, Netherlands, Singapore
CVE-2025-26466: Allocation of Resources Without Limits or Throttling
Description
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-26466 is a resource exhaustion vulnerability found in OpenSSH version 9.5p1. The flaw arises because the SSH server allocates a pong packet in memory for each ping packet it receives and queues these packets until the server/client key exchange completes. However, this memory allocation is not limited or throttled, allowing a malicious client to send a continuous stream of ping packets. This causes the server's memory consumption to grow uncontrollably, eventually exhausting available memory resources. The result is a denial of service condition where the SSH server becomes unresponsive or crashes, disrupting remote access and management capabilities. The vulnerability has a CVSS 3.1 base score of 5.9, indicating medium severity, with the vector showing network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved and published in February 2025 and is tracked under CVE-2025-26466. This issue is particularly critical for environments relying heavily on OpenSSH for secure remote administration, as it can be exploited remotely without authentication.
Potential Impact
The primary impact of CVE-2025-26466 is a denial of service condition caused by memory exhaustion on the SSH server. Organizations relying on OpenSSH 9.5p1 for remote access and management could experience service outages, disrupting operational continuity and potentially delaying incident response or system maintenance. This could affect cloud service providers, data centers, enterprise IT environments, and critical infrastructure sectors that depend on SSH for secure communications. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can have cascading effects, including inability to manage systems remotely, increased operational costs, and potential exposure to secondary risks if fallback or emergency access methods are not in place. The attack requires no authentication, making it accessible to any remote attacker with network access to the SSH server, although the high attack complexity may limit widespread exploitation. The absence of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2025-26466, organizations should first apply any official patches or updates released by the OpenSSH maintainers addressing this vulnerability. If patches are not yet available, administrators can implement rate limiting or connection throttling at the network level using firewalls or intrusion prevention systems to restrict the frequency of ping packets or SSH connection attempts from individual IP addresses. Configuring SSH server parameters to limit resource allocation or queue sizes related to ping/pong packets may also help, if supported. Monitoring SSH server memory usage and setting up alerts for abnormal consumption patterns can enable early detection of exploitation attempts. Additionally, deploying network segmentation to restrict SSH access to trusted networks and using VPNs or jump hosts can reduce exposure. Regularly reviewing and updating SSH server configurations to disable unnecessary features or reduce attack surface is recommended. Finally, maintaining comprehensive incident response plans that include recovery procedures for SSH service outages will improve resilience.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-02-10T18:31:47.979Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6835dda5182aa0cae2186687
Added to database: 5/27/2025, 3:43:33 PM
Last enriched: 2/27/2026, 12:38:41 PM
Last updated: 3/24/2026, 11:41:47 PM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.