OpenSSH Patches Critical Vulnerabilities: MitM and DoS Attacks
OpenSSH has recently released crucial security updates addressing two significant vulnerabilities—one enabling machine-in-the-middle (MitM) attacks and another causing denial-of-service (DoS) conditions. One of these flaws had remained undiscovered for over a decade, potentially exposing millions of SSH servers to cyber threats.
Discovery and Impact
Leading security firm Qualys uncovered and reported both vulnerabilities, demonstrating their exploitability to OpenSSH maintainers. OpenSSH, a widely used open-source implementation of the Secure Shell (SSH) protocol, is integral to secure remote access, file transfers, and tunneling over untrusted networks. Given its adoption across Linux, Unix-based systems (BSD, macOS), and enterprise IT environments, the risks posed by these vulnerabilities are substantial.
Details of the Vulnerabilities
CVE-2025-26465: Machine-in-the-Middle (MitM) Attack
This vulnerability, introduced in December 2014 with OpenSSH 6.8p1, affects OpenSSH clients when the 'VerifyHostKeyDNS' option is enabled. Threat actors can exploit it to hijack SSH sessions without user interaction, bypassing host verification and intercepting sensitive data.
Qualys explains that the flaw allows attackers to trick SSH clients into accepting a rogue server’s key by forcing an out-of-memory error during verification. This is done by intercepting an SSH connection and presenting a large SSH key with excessive certificate extensions, which exhausts the client’s memory and enables session hijacking.
While 'VerifyHostKeyDNS' is disabled by default in OpenSSH, FreeBSD enabled it by default from 2013 until 2023, leaving many systems at risk.
CVE-2025-26466: Pre-Authentication Denial-of-Service (DoS) Attack
The second flaw, a DoS vulnerability introduced in OpenSSH 9.5p1 (August 2023), results from unrestricted memory allocation during key exchange. An attacker can send repeated 16-byte ping messages, forcing OpenSSH to buffer 256-byte responses indefinitely, consuming system memory and CPU resources.
This can lead to system crashes, potentially disrupting critical infrastructure. While the impact is not as severe as the MitM vulnerability, its pre-authentication nature makes it a high-risk flaw.
Mitigation and Recommended Actions
To protect against these vulnerabilities, OpenSSH has released version 9.9p2, which includes fixes for both issues. Security teams should update immediately to prevent exploitation.
Additionally, administrators should:
Disable VerifyHostKeyDNS unless absolutely necessary.
Manually verify SSH key fingerprints for enhanced security.
Enforce strict connection rate limits to mitigate DoS attacks.
Monitor SSH traffic for abnormal patterns and unauthorized access attempts.
No comments:
Post a Comment