| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $5k-$25k | 0.00 |
Summary
A vulnerability identified as problematic has been detected in OpenSSH. This vulnerability affects unknown code of the component VerifyHostKeyDNS Handler. The manipulation leads to cryptographic issue. This vulnerability is listed as CVE-2025-26465. The attack may be initiated remotely. There is no available exploit.
Details
A vulnerability was found in OpenSSH (affected version not known) and classified as problematic. This issue affects some unknown functionality of the component VerifyHostKeyDNS Handler. The manipulation with an unknown input leads to a cryptographic issue vulnerability. Using CWE to declare the problem leads to CWE-310. Impacted is confidentiality. The summary by CVE is:
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
It is possible to read the advisory at seclists.org. The identification of this vulnerability is CVE-2025-26465 since 02/10/2025. The exploitation is known to be difficult. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 10/23/2025). The attack technique deployed by this issue is T1600 according to MITRE ATT&CK.
The vulnerability scanner Nessus provides a plugin with the ID 216407 (Debian dsa-5868 : openssh-client - security update), which helps to determine the existence of the flaw in a target environment.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at Tenable (216407), EUVD (EUVD-2025-4686) and CERT Bund (WID-SEC-2025-0394). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Affected
- IBM VIOS
- IBM AIX
- Debian Linux
- Amazon Linux 2
- FreeBSD Project FreeBSD OS
- Red Hat Enterprise Linux
- Fedora Linux
- Ubuntu Linux
- F5 BIG-IP
- SUSE Linux
- Xerox FreeFlow Print Server
- Oracle Linux
- NetApp FAS
- Gentoo Linux
- NetApp AFF
- NetApp ActiveIQ Unified Manager
- Siemens SIMATIC S7
- SUSE openSUSE
- RESF Rocky Linux
- OpenBSD OpenBSD
- Dell NetWorker
- Dell PowerScale
- Dell Avamar
- NetApp Data ONTAP
- Open Source OpenSSH
- Securepoint UTM
- Dell integrated Dell Remote Access Controller
- Fortinet FortiAnalyzer
- Fortinet FortiManager
- QNAP NAS
- WatchGuard Firebox
- HPE HP-UX
- Dell PowerProtect Data Domain
Product
Type
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.8VulDB Meta Temp Score: 5.7
VulDB Base Score: 3.7
VulDB Temp Score: 3.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.8
NVD Vector: 🔍
CNA Base Score: 6.8
CNA Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Cryptographic issueCWE: CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 216407
Nessus Name: Debian dsa-5868 : openssh-client - security update
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
02/10/2025 🔍02/18/2025 🔍
02/18/2025 🔍
10/23/2025 🔍
Sources
Advisory: seclists.orgStatus: Not defined
Confirmation: 🔍
CVE: CVE-2025-26465 (🔍)
GCVE (CVE): GCVE-0-2025-26465
GCVE (VulDB): GCVE-100-296123
EUVD: 🔍
CERT Bund: WID-SEC-2025-0394 - OpenSSH: Mehrere Schwachstellen
Entry
Created: 02/18/2025 14:31Updated: 10/23/2025 05:45
Changes: 02/18/2025 14:31 (51), 02/18/2025 22:05 (2), 02/19/2025 10:22 (12), 02/19/2025 13:38 (1), 04/14/2025 14:56 (11), 09/01/2025 11:31 (7), 10/14/2025 11:40 (1), 10/23/2025 05:45 (1)
Complete: 🔍
Cache ID: 216:BE0:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.