Vulnerability in OpenSSH when the VerifyHostKeyDNS option is enabled (CVE-2025-26465)
36806
27 January 2026
27 January 2026
CLOSED
MEDIUM
6.8 -- CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CVE-2025-26465
|
Brocade Security Advisory ID |
BSA-2026-2904 |
|
Component |
OpenSSH |
|
|
|
Summary
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
Products Affected
- Brocade SANnav OVA versions before 2.4.0b
Products Not Affected
- Brocade Fabric OS
[VEX Justification: Vulnerable_code_not_in_execute_path] - Brocade SANnav standard versions
[VEX Justification: Component_not_present] - Brocade ASCG standard versions
[VEX Justification: Component_not_present] - Brocade ASCG OVA versions
[VEX Justification: Vulnerable_code_not_in_execute_path]
Solution
- Solution provided in Brocade SANnav OVA versions 2.4.0b and 3.0.0
- SANnav base OS Security update also provided in the sannav_ova_8x_os OVA patch which can be applied to all SANnav OVA releases 2.3.0 through 2.4.0a
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
January 27, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.