PT-2026-29858 · Openbsd+3 · Openssh+3

Rabbit

·

Published

2026-04-02

·

Updated

2026-05-06

·

CVE-2026-35414

CVSS v3.1

8.1

High

VectorAV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions OpenSSH versions prior to 10.3
Description OpenSSH mishandles the authorized keys principals option in scenarios involving a principals list and a Certificate Authority (CA) that uses comma characters. A parsing error occurs where a comma in an SSH certificate principal name is incorrectly interpreted as a list separator rather than part of a string. This allows a user with a valid certificate from a trusted CA to bypass access controls and authenticate as root, effectively escalating low-privilege credentials to root access. The issue is caused by a code reuse error where the function handling the matching of cipher and key lists splits strings by commas and grants authentication if any fragment matches a subject value. Because the server perceives the authentication as legitimate, the attack does not trigger authentication failures in logs, making detection unreliable.
Recommendations Update to version 10.3 or later.

Fix

Weakness Enumeration

Related Identifiers

ALSA-2026:13380
ALSA-2026:13381
ALSA-2026:13383
BDU:2026-05931
CVE-2026-35414
ECHO-B2B2-3D93-518C
JLSEC-2026-78
OESA-2026-1963
USN-8222-1

Affected Products

Linuxmint
Openssh
Rocky Linux
Ubuntu