OpenSSH Shenanigans: New Bugs Open Door to MITM and DoS Attacks!
OpenSSH is in the spotlight with two vulnerabilities that could turn your secure connection into a hacker’s playground. The first allows attackers to impersonate servers, while the second could cause your server to take a nap right when you need it most. Update to OpenSSH 9.9p2 and keep the hackers out!

Hot Take:
Looks like OpenSSH just can’t catch a break! With vulnerabilities popping up like unwanted pop-ups on a sketchy website, it’s time to update those patches before someone turns your server into their own personal playground. Who knew SSH could stand for “Seriously, Stop Hacking”?
Key Points:
- Two new OpenSSH vulnerabilities (CVE-2025-26465 and CVE-2025-26466) allow MITM and DoS attacks.
- CVE-2025-26465 affects the OpenSSH client and allows MITM attacks when VerifyHostKeyDNS is enabled.
- CVE-2025-26466 affects both client and server, leading to potential DoS attacks.
- Both vulnerabilities have been fixed in OpenSSH version 9.9p2.
- Previous vulnerability CVE-2024-6409, allowing RCE, was addressed in OpenSSH versions 8.7p1 and 8.8p1.
Already a member? Log in here