Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs

Source: BankInfoSecurity.com RSS Syndication
Author: unknown
URL: https://www.bankinfosecurity.com/proof-of-concept-exploits-published-for-2-new-openssh-bugs-a-27544

“`markdown
# ONE SENTENCE SUMMARY:
Two new OpenSSH vulnerabilities enable man-in-the-middle attacks and denial of service, prompting urgent patching to mitigate security risks.

# MAIN POINTS:
1. Two OpenSSH vulnerabilities (CVE-2025-26465, CVE-2025-26466) expose millions of servers to security threats.
2. The man-in-the-middle flaw (CVE-2025-26465) allows attackers to impersonate servers and intercept SSH sessions.
3. The denial of service flaw (CVE-2025-26466) enables resource exhaustion attacks using SSH2_MSG_PING packets.
4. OpenSSH patched both flaws in version 9.9p2, released on February 18, 2025.
5. The man-in-the-middle attack requires the VerifyHostKeyDNS option to be enabled, which is disabled by default.
6. FreeBSD had VerifyHostKeyDNS enabled by default from September 2013 until March 2023.
7. The denial of service attack can be mitigated using built-in OpenSSH mechanisms like LoginGraceTime and MaxStartups.
8. Qualys Security Advisory team discovered and reported the flaws to OpenSSH on January 31, 2025.
9. Proof-of-concept exploit code was published by Qualys on the same day OpenSSH released patches.
10. Urgent upgrading to OpenSSH 9.9p2 is recommended to prevent potential exploits.

# TAKEAWAYS:
1. Immediate patching is crucial to mitigate OpenSSH vulnerabilities and prevent potential attacks.
2. Organizations should verify their SSH configurations, especially the VerifyHostKeyDNS setting.
3. Built-in OpenSSH security mechanisms can help reduce denial of service risks.
4. Attackers could exploit these flaws to intercept credentials or disrupt server operations.
5. Security teams must stay updated on vulnerabilities and apply patches as soon as they are released.
“`