HomeCyber BalkansOpenSSH patches vulnerabilities allowing man-in-the-middle and DoS attacks

OpenSSH patches vulnerabilities allowing man-in-the-middle and DoS attacks

Published on

spot_img

Recent patches have been released for OpenSSH, the widely utilized tool for managing Linux and BSD systems remotely. These patches address two vulnerabilities that could potentially be exploited by attackers. The first vulnerability could enable attackers to carry out a man-in-the-middle attack on OpenSSH clients with specific configurations. This would allow the attackers to impersonate a server and intercept sensitive communications. The second vulnerability has the potential to cause CPU resource exhaustion.

According to a report from researchers at Qualys who discovered the vulnerabilities, SSH sessions are a prime target for attackers seeking to intercept credentials or hijack sessions. In the event of a compromise, hackers could gain access to sensitive data, move laterally across critical servers, and extract valuable information such as database credentials. Such breaches could result in reputational damage, violation of compliance regulations (such as GDPR, HIPAA, PCI-DSS), and disruptions to critical operations due to system downtime needed to contain the threat.

The man-in-the-middle vulnerability, known as CVE-2025-26465, was introduced in the code over a decade ago in December 2014. As a result, this vulnerability affects all OpenSSH versions from 6.8p1 through 9.9p1.

It is crucial for users of OpenSSH to apply the patches promptly to mitigate the risk of exploitation. Failure to do so could leave systems vulnerable to potential attacks that could result in severe consequences. System administrators and security teams are advised to stay informed about such vulnerabilities and take necessary actions to protect their systems and data.

Furthermore, this incident underscores the importance of regular security updates and patch management in maintaining the security of software and systems. Vulnerabilities can emerge at any time, and prompt action is essential to prevent potential security breaches. By staying proactive and vigilant, organizations can enhance their security posture and safeguard against cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...