Description Preview
Overview
CVE-2025-26466 is a vulnerability in OpenSSH that can lead to a denial of service attack. The flaw is due to the SSH server allocating a pong packet in a memory buffer for each ping packet it receives, which is only freed when the server/client key exchange has finished. A malicious client can exploit this by continuously sending such packets, causing an uncontrolled increase in memory consumption on the server side. This can cause the server to become unavailable, resulting in a denial of service attack. The vulnerability has a CVSS v3.1 base score of 5.9, indicating a medium severity level.
Remediation
This issue can be mitigated by setting the following three different options in the sshd configuration file located at: /etc/ssh/sshd_config
MaxStartups: Set to a reasonable value, this option controls the maximum number of concurrent unauthenticated connections the SSH server accepts.
PerSourcePenalties: Set its suboptions to a reasonable value, this option is used to help sshd to detect and drop connections that are potentially malicious for the SSH server.
LoginGraceTime: Set to a reasonable value, this option controls how much time the SSH server will wait the client to authenticate before dropping its connection.
All the three option above needs to be set to implement a full mitigation for this vulnerability.
References
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Health Care & Social AssistanceHealth Care & Social Assistance
- ManufacturingManufacturing
- Public AdministrationPublic Administration
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- InformationInformation
- Other Services (except Public Administration)Other Services (except Public Administration)
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- MiningMining
- Accommodation & Food ServicesAccommodation & Food Services
- ConstructionConstruction
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Wholesale TradeWholesale Trade
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services