CVE-2025-26465

Updated: 2026-02-27 02:45:16.893486

Description:

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 6.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU openssh 8.7p1 6.8 MEDIUM Released CLSA-2025:1741290429 2025-03-06 22:07:10
Alpine Linux 3.18 ELS openssh 9.3 6.8 MEDIUM Ignored 2025-09-10 13:45:04 Ignored due to low severity
CentOS 6 ELS openssh 5.3p1 6.8 MEDIUM Not Vulnerable 2025-03-07 21:57:51 not vulnerable
CentOS 7 ELS openssh 7.4p1 6.8 MEDIUM Released CLSA-2025:1742926277 2025-04-10 03:17:54
CentOS 8.4 ELS openssh 8.0p1-6 6.8 MEDIUM Released CLSA-2025:1742722852 2025-03-24 03:37:40
CentOS 8.5 ELS openssh 8.0p1-10 6.8 MEDIUM Released CLSA-2025:1742380145 2025-03-20 03:57:14
CentOS Stream 8 ELS openssh 8.0p1 6.8 MEDIUM Released CLSA-2025:1742661734 2025-03-23 03:34:15
CloudLinux 6 ELS openssh 5.3p1 6.8 MEDIUM Not Vulnerable 2025-03-07 21:57:49 not vulnerable
CloudLinux 7 ELS openssh 7.4p1 6.8 MEDIUM Released CLSA-2025:1743415556 2025-04-10 03:17:59
Debian 10 ELS openssh 7.9p1 6.8 MEDIUM Released CLSA-2025:1766136770 2025-12-19 12:00:00
Total: 17