Ad

CVE-2025-26466

MEDIUM CVSS 3.1: 5.9 EPSS 42.5%
Updated Feb 10, 2026
Openbsd
Parameter Value
CVSS 5.9 (MEDIUM)
Type CWE-770 (Allocation Without Limits)
Vendor Openbsd
Public PoC No

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished.

A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
High
Difficult to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
None
No data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 14

Configuration From (including) Up to (excluding)
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.5:p1:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.6:-:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.6:p1:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.7:-:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.7:p1:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.8:p1:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*