New OpenSSH flaws expose SSH servers to MiTM and DoS attacks (www.bleepingcomputer.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 18 Feb 17:33
https://sh.itjust.works/post/33030715

#cybersecurity

threaded - newest

JoeKrogan@lemmy.world on 18 Feb 19:37 next collapse

Thanks for heads up.

admin@sh.itjust.works on 19 Feb 03:48 collapse

“The attack against the OpenSSH client (CVE-2025-26465) succeeds regardless of whether the VerifyHostKeyDNS option is set to “yes” or “ask” (its default is “no”), requires no user interaction, and does not depend on the existence of an SSHFP resource record (an SSH fingerprint) in DNS,” explains Qualys.

Thankfully is not enabled by default…