Cyber Posture

CVE-2025-26466

Medium

Published: 28 February 2025

Published
28 February 2025
Modified
10 February 2026
KEV Added
Patch
CVSS Score 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.6237 98.4th percentile
Risk Priority 49 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26466 is a medium-severity Allocation of Resources Without Limits or Throttling (CWE-770) vulnerability in Openbsd Openssh. Its CVSS base score is 5.9 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Direct Network Flood (T1498.001); ranked in the top 1.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-6 (Resource Availability).

Threat & Defense at a Glance

What attackers do: exploitation maps to Direct Network Flood (T1498.001) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely identification, reporting, and remediation of the OpenSSH memory management flaw through patching.

prevent

Provides denial-of-service protection mechanisms to prevent memory exhaustion from malicious ping packet floods targeting the SSH server.

prevent

Ensures resource availability by protecting system memory from unauthorized or uncontrolled consumption during pre-key exchange ping handling.

MITRE ATT&CK Enterprise TechniquesAI

T1498.001 Direct Network Flood Impact
Adversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a target.
T1499.001 OS Exhaustion Flood Impact
Adversaries may launch a denial of service (DoS) attack targeting an endpoint's operating system (OS).
T1499.002 Service Exhaustion Flood Impact
Adversaries may target the different network services provided by systems to conduct a denial of service (DoS).
Why these techniques?

Vulnerability enables pre-authentication DoS via ping packet flood causing asymmetric memory exhaustion on OpenSSH server (and client), facilitating direct network floods and service/OS exhaustion.

NVD Description

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key…

more

exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

Deeper analysisAI

CVE-2025-26466, published on 2025-02-28, is a vulnerability in the OpenSSH package affecting the SSH server component. The flaw stems from improper memory management during the handling of ping packets received before key exchange completion. For each ping packet, the server allocates a pong packet in a memory buffer and stores it in a queue, but these are only freed after the server/client key exchange finishes. This allows a malicious client to send repeated ping packets, resulting in uncontrolled memory consumption and potential server unavailability, classified under CWE-770 (Allocation of Resources Without Limits or Throttling). The CVSS v3.1 base score is 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

A remote, unauthenticated attacker can exploit this vulnerability over the network by continuously sending ping packets to the SSH server prior to key exchange. The high attack complexity (AC:H) likely arises from the need to precisely time and sustain the packet flood without triggering other defenses or completing the handshake. Successful exploitation leads to denial of service through memory exhaustion, rendering the server unresponsive, with no impact on confidentiality or integrity.

Mitigation details are provided in vendor advisories, including the Red Hat security bulletin at https://access.redhat.com/security/cve/CVE-2025-26466, the associated Bugzilla report at https://bugzilla.redhat.com/show_bug.cgi?id=2345043, and analyses from Qualys (https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt) and security mailing lists such as oss-sec (https://seclists.org/oss-sec/2025/q1/144) and fulldisclosure (http://seclists.org/fulldisclosure/2025/Feb/18). Security practitioners should consult these for patch availability and workarounds specific to affected OpenSSH versions.

Details

CWE(s)

Affected Products

openbsd
openssh
9.5, 9.6, 9.7, 9.8, 9.9
canonical
ubuntu linux
24.04, 24.10
debian
debian linux
11.0, 12.0, 13.0

CVEs Like This One

CVE-2026-23490Same product: Debian Debian Linux
CVE-2024-56374Same product: Debian Debian Linux
CVE-2025-26699Same product: Debian Debian Linux
CVE-2026-32062Shared CWE-770
CVE-2025-24033Shared CWE-770
CVE-2026-41399Shared CWE-770
CVE-2025-51846Shared CWE-770
CVE-2024-57722Shared CWE-770
CVE-2025-8099Shared CWE-770
CVE-2025-26465Same product: Debian Debian Linux

References