SSH: OpenSSH sshd SSH2_MSG_PING Denial Of Service

This signature detects attempts to exploit a known vulnerability against OpenSSH sshd SSH2_MSG_PING. A successful attack can result in a denial-of-service condition.

Extended Description

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

Affected Products

Openbsd openssh

References

CVE: CVE-2025-26466

Short Name
SSH:OPENSSH:PING-DOS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SSH
Keywords
CVE-2025-26466 Denial Of OpenSSH SSH2_MSG_PING Service sshd
Release Date
04/09/2025
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3798
False Positive
Unknown
Vendors

Openbsd

Debian

Canonical

Found a potential security threat?