6.8 CVE-2025-26465
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
https://nvd.nist.gov/vuln/detail/CVE-2025-26465
Categories
CWE-390 : Detection of Error Condition Without Action
The product detects a specific error, but takes no actions to handle the error. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Properly handle each exception. This is the recommended solution. Ensure that all exceptions are handled in such a way that you can be sure of the state of your system at any given moment. If a function returns an error, it is important to either fix the problem and try again, alert the user that an error has happened and let the program continue, or alert the user and close and cleanup the program. Subject the product to extensive testing to discover some of the possible instances of where/how errors or return values are not handled. Consider testing techniques such as ad hoc, equivalence partitioning, robustness and fault tolerance, mutation, and fuzzing. A GPU data center manager detects an error due to a malformed request but does not act on it, leading to memory corruption.
References
CPE
cpe |
start |
end |
Configuration 1 |
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* |
>= 6.9 |
<= 9.8 |
cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:* |
|
|
cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:* |
|
|
cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:* |
|
|
Configuration 2 |
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* |
|
|
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:* |
|
|
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* |
|
|
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
|
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* |
|
|
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
|
|
REMEDIATION
Patch
EXPLOITS
Exploit-db.com
id |
description |
date |
|
No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
id |
description |
severity |
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer