Query Details
// Critical OpenSSH Vulnerabilities – Patch Prioritization // The following KQL identified all your internet facing OpenSSH servers vulnerable to CVE-2025-26466 and CVE-2025-26465. You should get your IT infra engineers to prioritize patching these servers to version 9.9p2 that is released on 18th Feb 2025. Let's Go ! 🛡️ // https://www.openwall.com/lists/oss-security/2025/02/18/1 // https://www.openssh.com/releasenotes.html let InternetFacingEP = DeviceInfo | where IsInternetFacing == true and isnotempty(PublicIP) | distinct DeviceId; let OpenSSHFixedVersion = dynamic(["9.9p2"]); // https://www.openssh.com/releasenotes.html DeviceTvmSoftwareInventory | where SoftwareName has "openssh" | where not (SoftwareVersion has_any(OpenSSHFixedVersion)) | where DeviceId has_any(InternetFacingEP)
This KQL query is designed to identify internet-facing servers running OpenSSH that are vulnerable to specific security vulnerabilities (CVE-2025-26466 and CVE-2025-26465). Here's a simple breakdown of what the query does:
Identify Internet-Facing Devices:
DeviceInfo table to find devices that are accessible from the internet (i.e., they have a public IP address).DeviceId) of these internet-facing devices.Check OpenSSH Version:
DeviceTvmSoftwareInventory table to find devices that have OpenSSH installed.Output Vulnerable Devices:
The goal is to help IT infrastructure engineers quickly identify and prioritize the patching of vulnerable OpenSSH servers to enhance security.

Steven Lim
Released: February 18, 2025
Tables
Keywords
Operators