Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. With OpenSSH integral to enterprise infrastructure, these vulnerabilities pose significant risks to data integrity, system availability, and regulatory compliance. Affecting OpenSSH versions 9.5p1 through 9.9p1, this vulnerability permits attackers to exhaust server resources via asymmetric CPU/memory consumption. The MitM vulnerability undermines SSH’s foundational promise of secure communication, enabling stealthy breaches that evade traditional monitoring. The Qualys Threat Research Unit (TRU) has uncovered two high-severity vulnerabilities in OpenSSH, the widely used suite for secure network communication. This vulnerability impacts OpenSSH clients running versions 6.8p1 through 9.9p1 and arises when the VerifyHostKeyDNS option is enabled. Tracked as CVE-2025-26465 and CVE-2025-26466, these flaws enable machine-in-the-middle (MitM) attacks against clients and pre-authentication denial-of-service (DoS) exploits targeting both clients and servers. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. This compromises confidentiality and allows adversaries to steal credentials, manipulate data, or pivot to internal systems. By flooding unauthenticated sessions with SSH2_MSG_PING packets, adversaries can cripple systems, locking administrators out of critical infrastructure. The issue with CVE-2025-26466 is that attackers can exploit it without needing to steal credentials, making it easier for them to gain access. Qualys emphasizes that the flaw’s 11-year presence (introduced in December 2014) underscores the need for rigorous configuration audits. Intel by Intruder now uses AI to contextualize NVD descriptions, helping security teams assess risk faster. Attackers exploiting this flaw can impersonate legitimate servers by bypassing host key verification, even when DNS SSHFP records are absent.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 18 Feb 2025 15:30:30 +0000