The Register: FreSSH bugs undiscovered for years threaten OpenSSH security

Source URL: https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/
Source: The Register
Title: FreSSH bugs undiscovered for years threaten OpenSSH security

Feedly Summary: Exploit code now available for MitM and DoS attacks
Researchers can disclose two brand-new vulnerabilities in OpenSSH now that patches have been released.…

AI Summary and Description: Yes

Summary: The text discusses two newly discovered vulnerabilities in OpenSSH, specifically CVE-2025-26465 and CVE-2025-26466, both of which facilitate potential security breaches, including machine-in-the-middle (MitM) attacks and denial-of-service (DoS) attacks. Given OpenSSH’s critical role in securing remote connections, these vulnerabilities raise significant concerns for organizations relying on this tool for encrypted communications.

Detailed Description:

The text illustrates essential security updates related to OpenSSH, a vital component in managing encrypted remote connections for various operating systems and enterprises. Key points include:

– **Vulnerability Details:**
– **CVE-2025-26465 (MitM Attack):**
– This vulnerability can be exploited when the “VerifyHostKeyDNS” option is configured to “yes” or “ask.”
– It permits attackers to perform MitM attacks, bypassing identity verification checks of the server.
– If exploited, sensitive data could be intercepted or manipulated, posing a grave risk to organizations using OpenSSH for secure communications.

– **CVE-2025-26466 (Denial of Service):**
– This vulnerability could lead to denial-of-service (DoS) conditions affecting both the client and server, potentially causing extended outages and disrupting maintenance activities.

– **Severity Ratings:**
– The severity scores for both vulnerabilities reflect moderate urgency (6.8 and 5.9).
– Despite not being classified as critical, the prominence of OpenSSH used by major corporations heightens concerns.

– **Historical Context:**
– The MitM vulnerability has been part of OpenSSH since 2014, while the DoS vulnerability was introduced in August 2023.
– The recent concerns about the MitM vulnerability are particularly important for administrators who depend on OpenSSH for daily operations.

– **Impact on Compliance and Operations:**
– Exploitation of these vulnerabilities could lead to significant compliance issues, violating standards such as GDPR, HIPAA, and PCI-DSS.
– The potential for reputational damage and operational disruptions underscores the importance of timely patching.

– **Actions Taken:**
– OpenSSH has released an update (version 9.9p2) addressing both vulnerabilities, and Qualys provided a proof-of-concept (PoC) exploit for further understanding of these vulnerabilities.
– Administrators are advised to apply the patches promptly to mitigate risks.

The discovery of these vulnerabilities and the ability to exploit them serve as a reminder of the importance of vigilance in software security and the necessity of maintaining up-to-date systems to protect against evolving threats.