A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
History

Tue, 15 Apr 2025 03:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_eus:9.4

Mon, 14 Apr 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Debian
Debian debian Linux
Netapp
Netapp active Iq Unified Manager
Netapp ontap
Openbsd
Openbsd openssh
Redhat openshift Container Platform
CPEs cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Debian
Debian debian Linux
Netapp
Netapp active Iq Unified Manager
Netapp ontap
Openbsd
Openbsd openssh
Redhat openshift Container Platform

Mon, 14 Apr 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Eus
CPEs cpe:/a:redhat:rhel_eus:9.4::appstream
cpe:/o:redhat:rhel_eus:9.4::baseos
Vendors & Products Redhat rhel Eus
References

Mon, 03 Mar 2025 18:45:00 +0000


Fri, 28 Feb 2025 13:45:00 +0000

Type Values Removed Values Added
References

Wed, 19 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 19 Feb 2025 14:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 19 Feb 2025 05:30:00 +0000


Tue, 18 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
References

Tue, 18 Feb 2025 18:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
Title Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-390
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-04-14T11:05:35.577Z

Reserved: 2025-02-10T18:31:47.978Z

Link: CVE-2025-26465

cve-icon Vulnrichment

Updated: 2025-03-03T17:48:15.682Z

cve-icon NVD

Status : Modified

Published: 2025-02-18T19:15:29.230

Modified: 2025-04-14T11:15:14.353

Link: CVE-2025-26465

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-02-17T00:00:00Z

Links: CVE-2025-26465 - Bugzilla