PT-2025-7169 · Openssh +7 · Openssh +7

Gianluca Gabrielli

·

Published

2025-02-18

·

Updated

2025-07-15

·

CVE-2025-26466

CVSS v4.0
8.2
VectorAV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Name of the Vulnerable Software and Affected Versions:

OpenSSH versions 9.5p1 through 9.9p1

Description:

A flaw was found in the OpenSSH package, where for each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack. This issue can be exploited through memory exhaustion or CPU consumption, allowing an attacker to crash OpenSSH or disrupt operations.

Recommendations:

To mitigate this issue, upgrade to OpenSSH 9.9p2 immediately. Additionally, review SSH configurations to ensure security settings are properly enforced. As a temporary workaround, consider using the existing PerSourcePenalties feature to mitigate the condition. Restrict access to the vulnerable `SSH2 MSG PING` packets to minimize the risk of exploitation. Avoid using the `PING`/`PONG` messages between a client and a server until the issue is resolved.

Exploit

Fix

DoS

Resource Exhaustion

Allocation of Resources Without Limits

Weakness Enumeration

Related Identifiers

BDU:2025-01893
CVE-2025-26466
OPENSUSE-SU-2025:14820-1
OPENSUSE-SU-2025_0585-1
SUSE-SU-2025:0585-1
USN-7270-1

Affected Products

Astra Linux
Freebsd
Ibm Aix
Linuxmint
Apple Macos
Openssh
Suse
Ubuntu