Multiple vulnerabilities have been discovered in OpenSSH, potentially leading to privilege escalation and security bypasses. These issues affect users running OpenSSH versions prior to 10.3. A patch is now available to address these vulnerabilities.
These vulnerabilities range from low to medium severity, requiring prompt attention.
What is Openssh?
CVE-2026-35385: scp setuid/setgid Vulnerability
High severity due to potential privilege escalation.
When using the legacy scp protocol with the `-O` option as root, downloaded files may be incorrectly installed with setuid or setgid permissions. This occurs when the `-p` option (preserve mode) is not used, leading to unexpected privilege escalation.
How to fix CVE-2026-35385 in Openssh
Patch within 24h- 1.Update OpenSSH to version 10.3 or later.
composer update opensshVerify with:
ssh -VWorkaround: Avoid using the `-O` option with `scp` as root, or always use the `-p` option to preserve file modes.
NextGuard automatically flags CVE-2026-35385 if Openssh appears in any of your monitored projects — no manual lookup required.
CVE-2026-35387: Unintended ECDSA Algorithms
Low severity due to potential algorithm misuse.
OpenSSH interprets the listing of any ECDSA algorithm in `PubkeyAcceptedAlgorithms` or `HostbasedAcceptedAlgorithms` to mean all ECDSA algorithms. This can lead to the use of unintended and potentially weaker algorithms.
How to fix CVE-2026-35387 in Openssh
Patch within 7 days- 1.Update OpenSSH to version 10.3 or later.
composer update opensshVerify with:
ssh -VWorkaround: Carefully review and explicitly define the allowed ECDSA algorithms in `PubkeyAcceptedAlgorithms` and `HostbasedAcceptedAlgorithms`.
NextGuard automatically flags CVE-2026-35387 if Openssh appears in any of your monitored projects — no manual lookup required.
CVE-2026-35388: Missing Multiplexing Confirmation
Low severity due to potential session issues.
OpenSSH omits connection multiplexing confirmation for proxy-mode multiplexing sessions. This lack of confirmation could potentially lead to unexpected session behavior or denial-of-service conditions.
How to fix CVE-2026-35388 in Openssh
Patch within 7 days- 1.Update OpenSSH to version 10.3 or later.
composer update opensshVerify with:
ssh -VWorkaround: No specific workaround is available. Updating to the latest version is recommended.
NextGuard automatically flags CVE-2026-35388 if Openssh appears in any of your monitored projects — no manual lookup required.
Stay ahead of linux vulnerabilities
Proactively manage your security posture by tracking and mitigating potential threats. Use NextGuard to monitor your linux dependencies.
Start MonitoringFrequently asked questions
Multiple vulnerabilities in OpenSSH have been addressed with the release of version 10.3. It is crucial to update your systems to protect against potential exploits. You can see all linux vulnerabilities on our platform.
Related topics