OpenSSH vulnerabilities could pose huge threat to businesses everywhere
Qualys finds two worrying bugs in OpenSSH

- Qualys uncovers two bugs in OpenSSH
- The flaws could be used in Machine-in-the-Middle and Denial-of-Service attacks
- Patches are available, as well as some mitigations
OpenSSH carried two vulnerabilities that were enabling machine-in-the-middle (MitM) attacks and denial-of-service (DoS) attacks, experts have warned.
Cybersecurity researchers from the Qualys Threat Research Unit (TRU), who discovered the flaws and helped patch things up, noted they spotted two vulnerabilities, one tracked as CVE-2025-26465, and another tracked as CVE-2025-26466.
The former allows an active MitM attack on the OpenSSH client when the VerifyHostKeyDNS option is enabled, while the latter affects both the OpenSSH client and server, and enables pre-authentication DoS attacks.
Millions of victims
For the MitM attack to succeed, the VerifyHostKeyDNS option needs to be set to either “yes”, or “ask”, Qualys said, stressing that the default option is “no.” The attack requires no user interaction, and does not depend on the existence of an SSHFP resource record in DNS. This flaw was present in OpenSSH since December 2014, it was added, just before the release of OpenSSH 6.8p1.
“If an attacker can perform a man-in-the-middle attack via CVE-2025-26465, the client may accept the attacker’s key instead of the legitimate server’s key,” the blog reads. “If compromised, hackers could view or manipulate sensitive data, move across multiple critical servers laterally, and exfiltrate valuable information such as database credentials.”
The second flaw was introduced in August 2023, Qualys added, shortly before the release of OpenSSH 9.5p1. If threat actors can repeatedly exploit it, they may cause prolonged outages or prevent admins from managing servers, it was said.
The bug can be mitigated on the server side by leveraging existing mechanisms in OpenSSH such as LoginGraceTime, MaxStartups, and PerSourcePenalties.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Regardless of potential mitigations, Qualys urges all users to upgrade to OpenSSH 9.9p2, since this version addresses both vulnerabilities. “To ensure continued security, we strongly advise upgrading affected systems to 9.9p2 as soon as possible,” the researchers said.
OpenSSH (Open Secure Shell) is a suite of open source tools that provide encrypted communication, secure remote login, and file transfers over an unsecured network using the SSH protocol.
You might also like
- Thousands of servers could be at risk due to major OpenSSH security flaw
- We've rounded up the best password managers
- Take a look at our guide to the best authenticator app
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.