OpenSSH security update for CVE-2025-26465
37134
03 March 2026
03 March 2026
CLOSED
MEDIUM
6.8
CVE-2025-26465
|
Brocade Security Advisory ID |
BSA-2026-2904 |
|
Component |
OpenSSH |
|
|
|
Summary
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
Products Affected
- Brocade ASCG base OS (OVA deployment) before 3.4.0
Products Not Affected
- Brocade Fabric OS
[VEX Justification: Inline_mitigations_already_exist] - Brocade SANNav standard deployment
[VEX Justification: Vulnerable_code_not_in_execute_path] - Brocade SANnav base OS (OVA Deployment) before 3.0.0
[VEX Justification: Code_not_present] - Brocade ASCG Standard Deployment
[VEX Justification: Vulnerable_code_not_in_execute_path]
Solution
- Security update is provided in Brocade ASCG base OS (OVA Deployment) 3.4.0
- Although Brocade SANnav base OS (OVA Deployment) is not exploitable, Security update provided in Brocade SANnav base OS (OVA Deployment) 3.0.0
- Although Brocade Fabric OS is not exploitable, Security update provided in Brocade Fabric OS 10.0
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
March 3, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.