{"vulnerability": "CVE-2025-26466", "sightings": [{"uuid": "6e408d0d-6763-4484-af06-9b27b223ba54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lji3tgcfjk2o", "content": "", "creation_timestamp": "2025-03-03T13:51:12.297218Z"}, {"uuid": "31cb16fb-9d23-4d13-bed4-355035a76d66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/cybersonar.bsky.social/post/3ljaajbopz72d", "content": "", "creation_timestamp": "2025-02-28T10:53:40.129205Z"}, {"uuid": "706b7860-3748-4f2e-aab5-123f9bd29a00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-26466", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3litcqhz2gty2", "content": "", "creation_timestamp": "2025-02-23T07:29:15.215907Z"}, {"uuid": "f8bf7f4e-8a49-4fd8-9956-c22ffb17e16c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ljstyl55lo2h", "content": "", "creation_timestamp": "2025-03-07T20:30:09.720159Z"}, {"uuid": "11e53ab0-0912-4280-87ea-53d960e43fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3ljatzix7na2s", "content": "", "creation_timestamp": "2025-02-28T16:42:45.368286Z"}, {"uuid": "31d2d462-e9e8-4c0c-a021-b5b09d9dc2b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3litiuhjcfs2y", "content": "", "creation_timestamp": "2025-02-23T09:18:28.393211Z"}, {"uuid": "149792ca-beaf-48d3-84fb-1b39ec5752e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lih5tgnx5k2k", "content": "", "creation_timestamp": "2025-02-18T11:29:07.918192Z"}, {"uuid": "d1bae584-103b-46dd-b052-903a88083af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljiqup5nb22o", "content": "", "creation_timestamp": "2025-03-03T20:07:44.468221Z"}, {"uuid": "c80762b5-2c12-43f0-91ff-19ae3ff59bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ligwqw2rjw26", "content": "", "creation_timestamp": "2025-02-18T09:22:25.453189Z"}, {"uuid": "aa220f8b-bd73-4633-87f2-4fe5ae2b03b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lihi2ul3z22d", "content": "", "creation_timestamp": "2025-02-18T14:32:14.347297Z"}, {"uuid": "b22706fa-d63b-43fd-a1dd-b9fe963cb656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lihi5y2sw22i", "content": "", "creation_timestamp": "2025-02-18T14:34:00.530460Z"}, {"uuid": "0cd81a03-6c81-45a4-9fa2-ab9e96d0c355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-26466", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lihngclace62", "content": "", "creation_timestamp": "2025-02-18T16:08:56.458043Z"}, {"uuid": "2d82ac81-941f-4a39-b607-3abcf79a1564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lihnne4xqs2v", "content": "", "creation_timestamp": "2025-02-18T16:12:06.291263Z"}, {"uuid": "0d81fd3b-f7d1-47b8-a800-77f3900a09e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lihnosr4rk2v", "content": "", "creation_timestamp": "2025-02-18T16:12:50.904556Z"}, {"uuid": "bb1dfa76-633b-4fa3-bd70-2aeeaa976b20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/qualysofficial.bsky.social/post/3lihpass6ek2h", "content": "", "creation_timestamp": "2025-02-18T16:40:51.430219Z"}, {"uuid": "4664bb1d-0bd0-4547-ae81-3a9ace4f4662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/rxerium.com/post/3lihs3zmscc2c", "content": "", "creation_timestamp": "2025-02-18T17:31:49.443703Z"}, {"uuid": "36fcb81f-e57b-481c-82e5-c208e469602e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lihsj6dlze2h", "content": "", "creation_timestamp": "2025-02-18T17:39:10.805553Z"}, {"uuid": "9d819717-b077-4276-a2f4-4d4d1a6bb872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lihtzxhy342u", "content": "", "creation_timestamp": "2025-02-18T18:06:27.198724Z"}, {"uuid": "e3a7dc5e-518d-4dd9-ab77-bac578543c60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/hackread.bsky.social/post/3lihu5oltpk2s", "content": "", "creation_timestamp": "2025-02-18T18:08:34.213739Z"}, {"uuid": "52efb30e-85b4-404e-b26c-32b90f810be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lihyo7c65c2a", "content": "", "creation_timestamp": "2025-02-18T19:29:22.026425Z"}, {"uuid": "c3b8731e-1a04-4924-a8e3-417466f83e44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/ehcgroup.bsky.social/post/3lii53mtu5s2k", "content": "", "creation_timestamp": "2025-02-18T20:48:28.830265Z"}, {"uuid": "6a2314a6-ddbb-46d1-8827-9a063b71db6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/harmonic-osc.bsky.social/post/3liinbylum22t", "content": "", "creation_timestamp": "2025-02-19T01:38:21.168382Z"}, {"uuid": "af1807af-8c03-41a5-95a1-f238c30e54e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/jfreeg.bsky.social/post/3liiylja7fq2o", "content": "", "creation_timestamp": "2025-02-19T05:00:31.847464Z"}, {"uuid": "d8055d9f-a076-4b63-8132-0c721e9504df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3liiyukm2ms25", "content": "", "creation_timestamp": "2025-02-19T05:05:35.228632Z"}, {"uuid": "d93c26c7-6f66-49e2-9a16-d9de84523042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lij2agwy5s26", "content": "", "creation_timestamp": "2025-02-19T05:30:07.459286Z"}, {"uuid": "70dd70b8-6507-4eb1-a09d-1a4b2e2eab79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-26466", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lij3bybwp226", "content": "", "creation_timestamp": "2025-02-19T05:48:53.062942Z"}, {"uuid": "43215c5b-e081-46ae-b1d0-251fe345a783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lijgeinp6rl2", "content": "", "creation_timestamp": "2025-02-19T09:07:41.407899Z"}, {"uuid": "4f781e4c-33d9-4611-ae52-fd8b9c2e9692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "3a4badc9-2f0e-4cfc-be81-69116430b4c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-26466", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3limpdqc7jmg2", "content": "", "creation_timestamp": "2025-02-20T16:28:28.823371Z"}, {"uuid": "74ae7d4d-b856-432a-87b8-e0e575f1505c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-26466", "type": "seen", "source": "https://bsky.app/profile/maik.io/post/3limtytek3g2i", "content": "", "creation_timestamp": "2025-02-20T17:49:08.030899Z"}, {"uuid": "2fd3c4d7-9b90-41ef-8dcd-e9e77cf423c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lin3k6wgl22x", "content": "", "creation_timestamp": "2025-02-20T20:04:09.120781Z"}, {"uuid": "0f0e75db-deb0-4504-a0dd-4faf2143139c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lin3ssh7c22x", "content": "", "creation_timestamp": "2025-02-20T20:08:58.281906Z"}, {"uuid": "96b91ce8-9b38-46a6-832f-686c0bc7ce61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3linphk6jjl2j", "content": "", "creation_timestamp": "2025-02-21T02:00:33.716669Z"}, {"uuid": "1e1ed63f-b86c-4e8d-a44c-6bc753f36a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/almalinux.bsky.social/post/3ljjhle4rar2j", "content": "", "creation_timestamp": "2025-03-04T02:54:06.097944Z"}, {"uuid": "43b5c2ae-5b8a-4cb9-a308-79e39405375b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:41.199403Z"}, {"uuid": "798d312d-8077-4352-bd9d-f7ce32766e19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/xc0py.bsky.social/post/3lijqisz23c2z", "content": "", "creation_timestamp": "2025-02-19T12:08:33.929753Z"}, {"uuid": "08ad1cb0-3276-4f01-b00d-fecc62c61a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3lijsen7ues2x", "content": "", "creation_timestamp": "2025-02-19T12:42:00.178071Z"}, {"uuid": "f26f7d08-870a-418b-9550-5af63f3aa9c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/insightsintothings.bsky.social/post/3lijtlcsaqk2e", "content": "", "creation_timestamp": "2025-02-19T13:02:32.242891Z"}, {"uuid": "4632c887-b13d-420f-98b2-e1bb05b64d74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://threatintel.cc/2025/02/19/new-openssh-flaws-enable-maninthemiddle.html", "content": "", "creation_timestamp": "2025-02-19T11:40:45.000000Z"}, {"uuid": "fb360be3-f1de-48ef-b00b-91de50b53612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lik2mgyzzk2u", "content": "", "creation_timestamp": "2025-02-19T15:09:32.908737Z"}, {"uuid": "c0d424b1-2557-4cf7-8e0d-1f32b9973739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/cmcannady.bsky.social/post/3lik4v74pbs2t", "content": "", "creation_timestamp": "2025-02-19T15:50:12.866665Z"}, {"uuid": "757d2697-b353-4fa9-9f2b-3ab08d53cb25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-26466", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3likks3pwmf32", "content": "", "creation_timestamp": "2025-02-19T20:02:56.634783Z"}, {"uuid": "4fd422c4-7981-4888-9f18-2ba37dc159b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3likq6whn3s2n", "content": "", "creation_timestamp": "2025-02-19T21:35:38.369744Z"}, {"uuid": "5a875ac6-d177-4068-aded-79f911d3e14f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3mao2zsfgdk2s", "content": "", "creation_timestamp": "2025-12-23T15:32:15.848119Z"}, {"uuid": "d2d6fa12-73e9-4bae-84cf-ef57469a04d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/14623", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPatch Manual para a corre\u00e7\u00e3o das  CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH\nURL\uff1ahttps://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-21T09:21:01.000000Z"}, {"uuid": "74f5e709-cfce-46a6-89dd-d651d59dd4ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://gist.github.com/tigo11/07a88fdce8ca49654662cf66df08150a", "content": "", "creation_timestamp": "2026-01-14T15:50:53.000000Z"}, {"uuid": "ee514974-0e13-4a39-a8f7-08db273ddcf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://censys.com/blog/under-ctrl-dissecting-a-previously-undocumented-russian-net-access-framework/", "content": "", "creation_timestamp": "2026-03-31T02:00:10.000000Z"}, {"uuid": "d3e68731-8835-48d0-8cd8-f5dd0e6fe608", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://t.me/cvedetector/19188", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26466 - OpenSSH Memory Consumption Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26466 \nPublished : Feb. 28, 2025, 10:15 p.m. | 24\u00a0minutes ago \nDescription : A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T23:43:20.000000Z"}, {"uuid": "8b706638-dd08-4d28-8b44-e78814046998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://t.me/habr_com_news/34495", "content": "\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u043e \u0418\u0411 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Qualys \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0434\u0432\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (MITM\u2011\u0430\u0442\u0430\u043a\u0430 CVE-2025-26465 \u0438 DoS\u2011\u0430\u0442\u0430\u043a\u0430 CVE-2025-26466) \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0439 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430\u043c SSH 2.0 \u0438 SFTP \u2014 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 OpenSSH. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0435\u043a\u0442\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d \u043a\u043e\u0440\u0440\u0435\u043a\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0439 \u0432\u044b\u043f\u0443\u0441\u043a OpenSSH 9.9p2, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n#\u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0430", "creation_timestamp": "2025-02-20T09:44:48.000000Z"}, {"uuid": "10dda4e5-c1b9-4a00-b040-8501a7d3ecab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6009", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26466\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.\n\ud83d\udccf Published: 2025-02-28T21:25:28.861Z\n\ud83d\udccf Modified: 2025-02-28T22:02:51.403Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-26466\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2345043\n3. https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt", "creation_timestamp": "2025-02-28T22:27:30.000000Z"}, {"uuid": "c3d22b35-b3e6-43e9-97da-18e0072c833b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "Telegram/xPemCocsCKUXmxN-FoOBBJ3iutE4pbP0FjqrQP2HmxHDku0", "content": "", "creation_timestamp": "2026-04-02T21:00:04.000000Z"}, {"uuid": "67c27fe6-2816-482f-aea4-cc3927b3a79c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/14219", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-26466 POC\nURL\uff1ahttps://github.com/walidpyh/CVE-2025-26466\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-19T08:12:34.000000Z"}, {"uuid": "d821c627-d695-44e2-88f1-c04422568916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11360", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26466\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.\n\ud83d\udccf Published: 2025-02-28T21:25:28.861Z\n\ud83d\udccf Modified: 2025-04-10T23:10:06.357Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-26466\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2345043\n3. https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt", "creation_timestamp": "2025-04-10T23:49:31.000000Z"}, {"uuid": "3ff08d34-ff87-4731-b42f-5dc2518d2540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/41588", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-26466 .rb module for msfconsole\nURL\uff1ahttps://github.com/mrowkoob/CVE-2025-26466-msf\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-23T13:03:33.000000Z"}, {"uuid": "099696aa-3774-4cdf-9f23-a7ba0a234580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "Telegram/rLwJW8Sxt7uWsdYlvaJmmjpBkh3NAlLwTD4aRP5kjpBY5_E", "content": "", "creation_timestamp": "2025-06-23T21:00:07.000000Z"}, {"uuid": "80244faf-679d-4417-8b64-948656a9e362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "Telegram/3ptSeK_oDDrI5HgVEY-L5Y3rPYWI3rHXwopVSnScr2Yo-hQ", "content": "", "creation_timestamp": "2025-02-20T06:19:07.000000Z"}, {"uuid": "c54f0dce-4c98-4840-97ac-2fe4bc2bc361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://t.me/ton618cyber/2504", "content": "New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks \n\nTwo OpenSSH vulnerabilities (CVE-2025-26465, CVE-2025-26466) allow MitM and DoS attacks.\n\nThe Hacker News | thehackernews.com \u2022 Feb 18, 2025", "creation_timestamp": "2025-02-20T05:24:29.000000Z"}, {"uuid": "2a0eb196-c194-4cbd-bb4a-6fe743cc8e1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2486", "content": "#exploit\n1. CVE-2025-21420:\nWindows Disk Cleanup Tool EoP\nhttps://github.com/Network-Sec/CVE-2025-21420-PoC\n\n2. CVE-2024-34716:\nExploiting Linux Trickster via an XSS in PrestaShop\nhttps://github.com/TU-M/Trickster-HTB\n\n3. CVE-2025-26466:\nOpenSSH MitM/DoS\nhttps://github.com/rxerium/CVE-2025-26466\n]-&gt; https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt", "creation_timestamp": "2025-02-20T05:23:48.000000Z"}, {"uuid": "f2b65420-2f34-4a7f-82d9-ffc3be030acb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://t.me/CyberBulletin/2352", "content": "\u26a1Two new vulnerabilities found in OpenSSH \u2013 one allowing active Man-in-the-Middle (MitM) attacks and the other leading to Denial-of-Service (DoS). CVE-2025-26465 and CVE-2025-26466.\n\n#CyberBulletin", "creation_timestamp": "2025-02-19T03:20:53.000000Z"}, {"uuid": "3f95b00f-75a5-4472-a693-c73ced1c7d7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://t.me/ton618cyber/6750", "content": "New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks \n\nTwo OpenSSH vulnerabilities (CVE-2025-26465, CVE-2025-26466) allow MitM and DoS attacks.\n\nThe Hacker News | thehackernews.com \u2022 Feb 18, 2025", "creation_timestamp": "2025-02-20T05:24:28.000000Z"}, {"uuid": "15b7ea6c-2786-47ac-ba22-daa9c10dddb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10585", "content": "7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 228328 rttvar: 228328  to: 300000                                                        Nmap scan report for static.248.140.201.138.clients.your-server.de (138.201.140.248)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.9 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:9.9:        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2025-26466  5.9     https://vulners.com/cve/CVE-2025-26466        |_      CE606E2D-D0A5-5DE8-8A61-E7AB65789A99   5.9     https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99        *EXPLOIT*              Final times for host: srtt: 214222 rttvar: 214222  to: 300000                                                        Nmap scan report for static.249.140.201.138.clients.your-server.de (138.201.140.249)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.250.140.201.138.clients.your-server.de (138.201.140.250)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.251.140.201.138.clients.your-server.de (138.201.140.251)                                 Host is up, received user-set.", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "6a3b7ed4-4aa5-46c2-aa22-8ff61f55ef72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6719", "content": "#exploit\n1. CVE-2025-21420:\nWindows Disk Cleanup Tool EoP\nhttps://github.com/Network-Sec/CVE-2025-21420-PoC\n\n2. CVE-2024-34716:\nExploiting Linux Trickster via an XSS in PrestaShop\nhttps://github.com/TU-M/Trickster-HTB\n\n3. CVE-2025-26466:\nOpenSSH MitM/DoS\nhttps://github.com/rxerium/CVE-2025-26466\n]-&gt; https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt", "creation_timestamp": "2025-02-20T05:23:47.000000Z"}, {"uuid": "f2a2c0ba-7ae9-4cb8-a893-f27eb9b45f19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "Telegram/tWJJiad9MVscAB4p0bfH9Wn0D-1v_3Amt49tkBagEJSkxgqN", "content": "", "creation_timestamp": "2025-03-06T02:16:22.000000Z"}, {"uuid": "040ab312-88dd-4831-ae71-f406cf1c208e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://t.me/nemeZ1da_ru/5598", "content": "\u0412 OpenSSH \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0430\u0442\u0430\u043a\u0430\u043c \u0442\u0438\u043f\u0430 \u00ab\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e\u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\u00bb (MitM) \u0438 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (DoS). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u043c \u043f\u043e\u0434\u0440\u0430\u0437\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Qualys.\n\n\u041f\u0435\u0440\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c , \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2025-26465 , \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0432 \u043a\u043e\u0434\u0435 OpenSSH-\u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u0441 6.8p1 \u043f\u043e 9.9p1. \u041e\u0448\u0438\u0431\u043a\u0430 \u0434\u0435\u043b\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u0435 MitM-\u0430\u0442\u0430\u043a\u0438, \u0435\u0441\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u043e\u043f\u0446\u0438\u044f VerifyHostKeyDNS. \u0412 \u0442\u0430\u043a\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0434\u043c\u0435\u043d\u0438\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0439 \u043a\u043b\u044e\u0447 \u0438 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435, \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u044b\u0434\u0430\u0432\u0430\u044f \u0441\u0435\u0431\u044f \u0437\u0430 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440. \u0414\u0430\u043d\u043d\u044b\u0439 \u0431\u0430\u0433 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 OpenSSH \u0441 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2014 \u0433\u043e\u0434\u0430.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, CVE-2025-26466 , \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043a\u0430\u043a \u043a\u043b\u0438\u0435\u043d\u0442, \u0442\u0430\u043a \u0438 \u0441\u0435\u0440\u0432\u0435\u0440 OpenSSH, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 \u0432\u0435\u0440\u0441\u0438\u0438 9.5p1. \u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u044d\u0442\u0430\u043f\u0435 \u043f\u0440\u0435\u0434\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0432\u044b\u0437\u044b\u0432\u0430\u044f \u0447\u0440\u0435\u0437\u043c\u0435\u0440\u043d\u043e\u0435 \u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432 \u043a\u043e\u0434\u0435 OpenSSH \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2023 \u0433\u043e\u0434\u0430.\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2025-26465 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c SSH-\u0441\u0435\u0441\u0441\u0438\u0438 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c. \u041e\u0434\u043d\u0430\u043a\u043e \u0435\u0441\u0442\u044c \u0432\u0430\u0436\u043d\u044b\u0439 \u043d\u044e\u0430\u043d\u0441: \u043e\u043f\u0446\u0438\u044f VerifyHostKeyDNS, \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u0430\u044f \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438, \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0430.\n\n\u041e\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0431\u044b\u043b\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0432 OpenSSH 9.9p2, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0439 18 \u0444\u0435\u0432\u0440\u0430\u043b\u044f. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435, \u0447\u0442\u043e\u0431\u044b \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0440\u0438\u0441\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.", "creation_timestamp": "2025-02-25T13:07:22.000000Z"}, {"uuid": "5777a2a1-963c-491a-be68-023b3f1dd615", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2972", "content": "7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 228328 rttvar: 228328  to: 300000                                                        Nmap scan report for static.248.140.201.138.clients.your-server.de (138.201.140.248)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.9 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:9.9:        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2025-26466  5.9     https://vulners.com/cve/CVE-2025-26466        |_      CE606E2D-D0A5-5DE8-8A61-E7AB65789A99   5.9     https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99        *EXPLOIT*              Final times for host: srtt: 214222 rttvar: 214222  to: 300000                                                        Nmap scan report for static.249.140.201.138.clients.your-server.de (138.201.140.249)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.250.140.201.138.clients.your-server.de (138.201.140.250)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.251.140.201.138.clients.your-server.de (138.201.140.251)                                 Host is up, received user-set.", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "dbb64741-98c7-43f0-a40b-a520fafc15b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "Telegram/DjajqwOKtfZ_M5ClV_Ht6Zj14zVZ5RqpF76L3bZ8ar0sOu4", "content": "", "creation_timestamp": "2025-02-18T22:00:05.000000Z"}, {"uuid": "9462dab8-3d67-46d0-be2f-5e3812d3f8cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "Telegram/d7gGT6P5w0167A29QfsK40zTkPYvAXOZDKJHbAQ3B_NYmJE", "content": "", "creation_timestamp": "2025-02-20T12:00:10.000000Z"}, {"uuid": "35773308-bd22-4ed0-9f50-e5246c1f65ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11835", "content": "#exploit\n1. CVE-2025-21420:\nWindows Disk Cleanup Tool EoP\nhttps://github.com/Network-Sec/CVE-2025-21420-PoC\n\n2. CVE-2024-34716:\nExploiting Linux Trickster via an XSS in PrestaShop\nhttps://github.com/TU-M/Trickster-HTB\n\n3. CVE-2025-26466:\nOpenSSH MitM/DoS\nhttps://github.com/rxerium/CVE-2025-26466\n]-&gt; https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt", "creation_timestamp": "2025-02-20T12:03:40.000000Z"}, {"uuid": "bd6954b5-f99b-44cd-afdf-0803f8a9523c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6755", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 OpenSSH \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 MitM \u0438 DoS, \u043f\u0440\u0438\u0447\u0435\u043c \u043e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0435\u0449\u0435 \u0431\u043e\u043b\u0435\u0435 \u0434\u0435\u0441\u044f\u0442\u0438 \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434.\n\nMiTM-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-26465 \u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0435\u0449\u0435 \u0432 \u0434\u0435\u043a\u0430\u0431\u0440\u0435 2014 \u0433\u043e\u0434\u0430 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c OpenSSH 6.8p1, \u043e\u0441\u0442\u0430\u0432\u0430\u044f\u0441\u044c \u043d\u0435\u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u043e\u0439 \u0431\u043e\u043b\u0435\u0435 \u0434\u0435\u0441\u044f\u0442\u0438\u043b\u0435\u0442\u0438\u044f.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u044b OpenSSH, \u0435\u0441\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u043e\u043f\u0446\u0438\u044f VerifyHostKeyDNS. \n\n\u041f\u0440\u0438\u0447\u0435\u043c \u043d\u0435\u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e \u043e\u0442 \u0442\u043e\u0433\u043e, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0430 \u043b\u0438 \u043e\u043f\u0446\u0438\u044f \u0432 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u00ab\u0434\u0430\u00bb \u0438\u043b\u0438 \u00ab\u0441\u043f\u0440\u043e\u0441\u0438\u0442\u044c\u00bb (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u2014 \u00ab\u043d\u0435\u0442\u00bb), \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0438 \u043d\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u0442 \u043e\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 SSHFP \u0432 DNS.\n\n\u041f\u0440\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0438 \u044d\u0442\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043e\u0448\u0438\u0431\u043e\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u043c\u0430\u043d\u0443\u0442\u044c \u043a\u043b\u0438\u0435\u043d\u0442\u0430, \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0432 \u0435\u0433\u043e \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043a\u043b\u044e\u0447 \u043f\u043e\u0434\u0441\u0442\u0430\u0432\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u043f\u0440\u0438\u043d\u0443\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0432\u044b\u0437\u0432\u0430\u0432 \u043e\u0448\u0438\u0431\u043a\u0443 \u043d\u0435\u0445\u0432\u0430\u0442\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438.\n\n\u041f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0432 SSH-\u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0432 \u0431\u043e\u043b\u044c\u0448\u043e\u0439 SSH-\u043a\u043b\u044e\u0447 \u0441 \u0438\u0437\u0431\u044b\u0442\u043e\u0447\u043d\u044b\u043c\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f\u043c\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0432, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u0447\u0435\u0440\u043f\u0430\u0442\u044c \u043f\u0430\u043c\u044f\u0442\u044c \u043a\u043b\u0438\u0435\u043d\u0442\u0430, \u043e\u0431\u043e\u0439\u0442\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0445\u043e\u0441\u0442\u0430 \u0438 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0441\u0435\u0430\u043d\u0441, \u0447\u0442\u043e\u0431\u044b \u0443\u043a\u0440\u0430\u0441\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435, \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438 \u0438\u0437\u0432\u043b\u0435\u0447\u044c \u0434\u0430\u043d\u043d\u044b\u0435.\u00a0\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e VerifyHostKeyDNS \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0432 OpenSSH, \u0432 FreeBSD \u0441 2013 \u043f\u043e 2023 \u0433\u043e\u0434 \u043e\u043d\u0430 \u0431\u044b\u043b\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430, \u0447\u0442\u043e \u0441\u0434\u0435\u043b\u0430\u043b\u043e \u043c\u043d\u043e\u0433\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u0434\u043b\u044f \u0442\u0430\u043a\u0438\u0445 \u0430\u0442\u0430\u043a.\n\n\u0412\u0442\u043e\u0440\u0430\u044f CVE-2025-26466 \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0434\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432 OpenSSH 9.5p1, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0439 \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2023 \u0433\u043e\u0434\u0430.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u043a\u043b\u044e\u0447\u0430\u043c\u0438, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u043e\u043c\u0443 \u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044e \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043c\u043d\u043e\u0433\u043e\u043a\u0440\u0430\u0442\u043d\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u0435 16-\u0431\u0430\u0439\u0442\u043e\u0432\u044b\u0435 ping-\u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f, \u0447\u0442\u043e \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 OpenSSH \u0431\u0443\u0444\u0435\u0440\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c 256-\u0431\u0430\u0439\u0442\u043e\u0432\u044b\u0435 \u043e\u0442\u0432\u0435\u0442\u044b \u0431\u0435\u0437 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0439.\n\n\u0412\u043e \u0432\u0440\u0435\u043c\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u043a\u043b\u044e\u0447\u0430\u043c\u0438 \u044d\u0442\u0438 \u043e\u0442\u0432\u0435\u0442\u044b \u0445\u0440\u0430\u043d\u044f\u0442\u0441\u044f \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0432\u0440\u0435\u043c\u044f, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0447\u0440\u0435\u0437\u043c\u0435\u0440\u043d\u043e\u043c\u0443 \u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043f\u0435\u0440\u0435\u0433\u0440\u0443\u0437\u043a\u0435 \u0426\u041f, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0431\u043e\u044f\u043c \u0432 \u0440\u0430\u0431\u043e\u0442\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-26466 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043d\u0435 \u0442\u0430\u043a\u0438\u043c\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c\u0438, \u043a\u0430\u043a \u0443 \u043f\u0435\u0440\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u043e \u0442\u043e\u0442 \u0444\u0430\u043a\u0442, \u0447\u0442\u043e \u0435\u0435 \u043c\u043e\u0436\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0434\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u043d\u0435\u0441\u0435\u0442 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u0440\u0438\u0441\u043a \u0441\u0431\u043e\u044f.\n\n\u041a\u043e\u043c\u0430\u043d\u0434\u0430 OpenSSH \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 9.9p2, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044f \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043d\u0430 \u043d\u0435\u0435 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c VerifyHostKeyDNS, \u0435\u0441\u043b\u0438 \u0432 \u044d\u0442\u043e\u043c \u043d\u0435\u0442 \u043a\u0440\u0430\u0439\u043d\u0435\u0439 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0427\u0442\u043e \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b DoS, \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0432\u0432\u0435\u0441\u0442\u0438 \u0441\u0442\u0440\u043e\u0433\u0438\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u043d\u0430 \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a SSH \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0430\u043d\u043e\u043c\u0430\u043b\u0438\u0439.\n\n\u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0430\u044f \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043f\u043e \u0434\u0432\u0443\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c \u043e\u0442 Qualys - \u0437\u0434\u0435\u0441\u044c.", "creation_timestamp": "2025-02-19T11:51:50.000000Z"}, {"uuid": "2d0424a3-e72b-4eed-af7c-c4428d92c8c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://t.me/ctinow/231009", "content": "Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 &amp; CVE-2025-26466\nhttps://ift.tt/p4inuOV", "creation_timestamp": "2025-02-18T10:09:11.000000Z"}, {"uuid": "8f4cd493-190a-4804-907b-ec3f786a297a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26466", "type": "seen", "source": "https://t.me/thehackernews/6363", "content": "\ud83d\udd34 Two new vulnerabilities found in OpenSSH \u2013 one allowing active Man-in-the-Middle (MitM) attacks and the other leading to Denial-of-Service (DoS).\n\nGet the details on CVE-2025-26465 and CVE-2025-26466: https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html", "creation_timestamp": "2025-02-18T16:36:44.000000Z"}]}