
Two safety vulnerabilities had been found out within the OpenSSH safe networking software suite that, if effectively exploited, may just lead to an energetic machine-in-the-middle (MitM) and a denial-of-service (DoS) assault, respectively, underneath sure stipulations.
The vulnerabilities, detailed through the Qualys Risk Analysis Unit (TRU), are indexed under –
- CVE-2025-26465 – The OpenSSH consumer incorporates a good judgment error between variations 6.8p1 to 9.9p1 (inclusive) that makes it at risk of an energetic MitM assault if the VerifyHostKeyDNS choice is enabled, permitting a malicious interloper to impersonate a sound server when a consumer makes an attempt to connect with it (Offered in December 2014)
- CVE-2025-26466 – The OpenSSH consumer and server are at risk of a pre-authentication DoS assault between variations 9.5p1 to 9.9p1 (inclusive) that reasons reminiscence and CPU intake (Offered in August 2023)
“If an attacker can carry out a man-in-the-middle assault by way of CVE-2025-26465, the customer might settle for the attacker’s key as a substitute of the professional server’s key,” Saeed Abbasi, supervisor of product at Qualys TRU, mentioned.

“This may ruin the integrity of the SSH connection, enabling doable interception or tampering with the consultation ahead of the consumer even realizes it.”
In different phrases, a a hit exploitation may just allow malicious actors to compromise and hijack SSH classes, and acquire unauthorized get right of entry to to delicate information. It is price noting that the VerifyHostKeyDNS choice is disabled through default.
Repeated exploitation of CVE-2025-26466, however, may end up in availability problems, fighting directors from managing servers and locking professional customers out, successfully crippling regimen operations.
Each the vulnerabilities had been addressed in model OpenSSH 9.9p2 launched these days through OpenSSH maintainers.
The disclosure comes over seven months after Qualys make clear any other OpenSSH flaw dubbed regreSSHion (CVE-2024-6387) that can have ended in unauthenticated far flung code execution with root privileges in glibc-based Linux programs.