Metrics
Affected Vendors & Products
Tue, 15 Apr 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhel_eus:9.4 |
Mon, 14 Apr 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Netapp Netapp active Iq Unified Manager Netapp ontap Openbsd Openbsd openssh Redhat openshift Container Platform |
|
CPEs | cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Netapp Netapp active Iq Unified Manager Netapp ontap Openbsd Openbsd openssh Redhat openshift Container Platform |
Mon, 14 Apr 2025 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:9.4::appstream cpe:/o:redhat:rhel_eus:9.4::baseos |
|
Vendors & Products |
Redhat rhel Eus
|
|
References |
|
Mon, 03 Mar 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 28 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 19 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Wed, 19 Feb 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 19 Feb 2025 05:30:00 +0000
Tue, 18 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 18 Feb 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high. | |
Title | Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled | |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
Weaknesses | CWE-390 | |
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-14T11:05:35.577Z
Reserved: 2025-02-10T18:31:47.978Z
Link: CVE-2025-26465

Updated: 2025-03-03T17:48:15.682Z

Status : Modified
Published: 2025-02-18T19:15:29.230
Modified: 2025-04-14T11:15:14.353
Link: CVE-2025-26465
