Two safety vulnerabilities were found in the Safe OpenSSH Secure network, which can be successfully used by an active machine (MITM) and a refusal attack (DOS), respectively, under certain conditions.
Vulnerability minute According to the study threaten Qualys (TRU), there is listed below –
- Cve-2025-26465 – The Openssh Client Contains A Logic Error Between Versions 6.8p1 to 9.9p1 (inclusive) A LEGITIMATE Server When A Client Attempts To Connect To This (introduced in December 2014)
- Cve-2025-26466 – Customer and server Openssh vulnerable to the DOS attack before the sensor between versions 9.5p1 to 9.9p1 (inclusive), which causes memory and processor consumption (introduced in August 2023)
“If an attacker can attack a person in the middle part via CVE-2025-26465, the client can take the attacker’s key instead of the key to the legitimate server,” said Said Abasi, the Qualys Tru.
“This violates the integrity of the SSH connection, which allows you to potentially intercede or replace the session before the user even understands it.”
In other words, successful operation can allow malicious subjects to compromise and steal SSH sessions as well as get unauthorized access to sensitive data. It is worth noting that the RevifyhostKeydns option is disabled by default.
On the other hand, the CVE-2025-2646 CVE-2025-2646 can lead to a presence problem by preventing administrators from managing servers and blocking legal users, effectively crippling ordinary operations.
Both vulnerabilities were address In OpenSSH 9.9P2, released today by OpenSSH.
Disclosure occurs within seven months after Qualys shed light on another lack of Openssh, dubbed regress (CVE-2024-6387), which could lead to unauthorized execution of remote code with root privileges in Linux Systems based on Glibc.