PT-2026-42710 · Openssh · Openssh

Published

2026-05-22

·

Updated

2026-05-22

·

CVE-2026-39831

CVSS v3.1

9.1

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Name of the Vulnerable Software and Affected Versions The product name cannot be determined (affected versions not specified)
Description The Verify() method for FIDO/U2F security key types sk-ecdsa-sha2-nistp256@openssh.com and sk-ssh-ed25519@openssh.com failed to check the User Presence flag. This allows signatures generated without physical touch to be accepted, enabling the unattended use of a hardware security key.
Recommendations Return a "no-touch-required" extension in Permissions.Extensions from PublicKeyCallback to restore the previous behavior.

Fix

Related Identifiers

CVE-2026-39831
GO-2026-5019

Affected Products

Openssh