vulnerability

FreeBSD: VID-a8f1ee74-f267-11ef-87ba-002590c1f29c (CVE-2025-26466): FreeBSD -- Multiple vulnerabilities in OpenSSH

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Feb 24, 2025
Added
Mar 10, 2025
Modified
Dec 10, 2025

Description

Problem Description: OpenSSH client host verification error (CVE-2025-26465) ssh(1) contains a logic error that allows an on-path attacker to impersonate any server during certain conditions when the VerifyHostKeyDNS option is enabled. OpenSSH server denial of service (CVE-2025-26466) The OpenSSH client and server are both vulnerable to a memory/CPU denial of service while handling SSH2_MSG_PING packets. Impact: OpenSSH client host verification error (CVE-2025-26465) Under specific circumstances, a machine-in-the-middle may impersonate any server when the client has the VerifyHostKeyDNS option enabled. OpenSSH server denial of service (CVE-2025-26466) During the processing of SSH2_MSG_PING packets, a server may be subject to a memory/CPU denial of service.

Solutions

freebsd-upgrade-base-14_2-release-p2freebsd-upgrade-base-14_1-release-p8freebsd-upgrade-base-13_4-release-p4freebsd-upgrade-package-openssh-portablefreebsd-upgrade-package-openssh-portable-hpnfreebsd-upgrade-package-openssh-portable-gssapi
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.