Vulnerability Details CVE-2025-26466
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.39
EPSS Ranking 97.1%
CVSS Severity
CVSS v3 Score 5.9
Products affected by CVE-2025-26466
-
cpe:2.3:a:openbsd:openssh:9.5
-
cpe:2.3:a:openbsd:openssh:9.6
-
cpe:2.3:a:openbsd:openssh:9.7
-
cpe:2.3:a:openbsd:openssh:9.8
-
cpe:2.3:a:openbsd:openssh:9.9
-
cpe:2.3:o:canonical:ubuntu_linux:24.04
-
cpe:2.3:o:canonical:ubuntu_linux:24.10
-
cpe:2.3:o:debian:debian_linux:11.0
-
cpe:2.3:o:debian:debian_linux:12.0
-
cpe:2.3:o:debian:debian_linux:13.0