Bug 2344780 (CVE-2025-26465) - CVE-2025-26465 openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled
Summary: CVE-2025-26465 openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is e...
Keywords:
Status: NEW
Alias: CVE-2025-26465
Deadline: 2025-02-17
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-10 22:04 UTC by OSIDB Bzimport
Modified: 2025-04-14 10:55 UTC (History)
12 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:3837 0 None None None 2025-04-14 10:55:00 UTC

Description OSIDB Bzimport 2025-02-10 22:04:10 UTC
The OpenSSH client is vulnerable to an active machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (it is disabled by default): when a vulnerable client connects to a server, an active machine-in-the-middle can impersonate the server by completely bypassing the client's checks of the server's identity.

Comment 3 Sandipan Roy 2025-02-18 11:09:51 UTC
Making it Public as https://seclists.org/oss-sec/2025/q1/144

Comment 4 Klaas Demter 2025-02-19 09:39:34 UTC
I am reading that correctly on https://access.redhat.com/security/cve/CVE-2025-26465 -- there is no fix planned for rhel8 because it's a non-default config+moderate rating?

Comment 6 sakshi 2025-03-20 02:15:27 UTC
Regarding the CVE link mentioned below, the OpenSSH client must have the VerifyHostKeyDNS option enabled, which is disabled by default in Red Hat Enterprise Linux (RHEL).


https://access.redhat.com/security/cve/CVE-2025-26465#cve-affected-packages

Products / Services                         Components  State  Errata Release Date
```
Red Hat Enterprise Linux 9	              openssh   Affected		
Red Hat OpenShift Container Platform 4	       rhcos   Fix deferred	

If ` VerifyHostKeyDNS` option is disabled in RHEL 9, then why it's `affected` state.

Is there any timeline to fix this in RHCOS?

Comment 7 sakshi 2025-03-24 03:15:21 UTC
Customer is looking for update on my previous comment. Kindly assist. Thanks!

Comment 10 errata-xmlrpc 2025-04-14 10:54:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:3837 https://access.redhat.com/errata/RHSA-2025:3837


Note You need to log in before you can comment on or make changes to this bug.