CVE-2026-35387
Received Received - Intake
ECDSA Algorithm Misinterpretation Vulnerability in OpenSSH Before

Publication date: 2026-04-02

Last updated on: 2026-04-27

Assigner: MITRE

Description
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openbsd openssh to 10.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-670 The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects OpenSSH versions before 10.3, where the software can mistakenly use unintended ECDSA algorithms. Specifically, if any ECDSA algorithm is listed in the configuration options PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms, OpenSSH misinterprets this to mean that all ECDSA algorithms are accepted.


How can this vulnerability impact me? :

The impact of this vulnerability is limited but notable. Because OpenSSH may accept all ECDSA algorithms when only some were intended, it could lead to the use of weaker or unintended cryptographic algorithms. According to the CVSS score, the impact on integrity is low, with no impact on confidentiality or availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart