OpenSSH Patches Two Critical Vulnerabilities, One Undetected for a Decade

Reading Time: 3 Minutes
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
CVE-2025-26466 – Pre-Authentication Denial of Service (DoS)
This flaw allows attackers to consume excessive memory and CPU before authentication.
- By sending small 16-byte ping messages, OpenSSH buffers 256-byte responses.
- These responses accumulate indefinitely, leading to high memory consumption and system crashes.
- Though not as severe as the MitM attack, this can be exploited to disrupt SSH services on affected systems.
Trending: Recon Tool: getJS
Security Fixes and Mitigation Steps
Patch Immediately
- OpenSSH 9.9p2, released today, fixes both vulnerabilities.
- All users should upgrade to this version as soon as possible.
Mitigation for CVE-2025-26465 (MitM Attack)
- Disable VerifyHostKeyDNS unless absolutely necessary.
- Manually verify SSH key fingerprints to ensure secure connections.
Mitigation for CVE-2025-26466 (DoS Attack)
- Enforce SSH connection rate limits to prevent excessive resource consumption.
- Monitor SSH traffic for unusual activity to detect early signs of exploitation.
For further technical details, Qualys has provided a full report on both vulnerabilities.
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: bleepingcomputer.com