OpenSSH Shenanigans: New Bugs Open Door to MITM and DoS Attacks!

OpenSSH is in the spotlight with two vulnerabilities that could turn your secure connection into a hacker’s playground. The first allows attackers to impersonate servers, while the second could cause your server to take a nap right when you need it most. Update to OpenSSH 9.9p2 and keep the hackers out!

Hot Take:

Looks like OpenSSH just can’t catch a break! With vulnerabilities popping up like unwanted pop-ups on a sketchy website, it’s time to update those patches before someone turns your server into their own personal playground. Who knew SSH could stand for “Seriously, Stop Hacking”?

Key Points:

  • Two new OpenSSH vulnerabilities (CVE-2025-26465 and CVE-2025-26466) allow MITM and DoS attacks.
  • CVE-2025-26465 affects the OpenSSH client and allows MITM attacks when VerifyHostKeyDNS is enabled.
  • CVE-2025-26466 affects both client and server, leading to potential DoS attacks.
  • Both vulnerabilities have been fixed in OpenSSH version 9.9p2.
  • Previous vulnerability CVE-2024-6409, allowing RCE, was addressed in OpenSSH versions 8.7p1 and 8.8p1.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here