CVE-2026-35414
Improper Authorized_Keys Parsing in OpenSSH Before
Publication date: 2026-04-02
Last updated on: 2026-04-10
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openbsd | openssh | to 10.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-670 | The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
Exploitation of this vulnerability could lead to limited confidentiality and integrity impacts, as indicated by the CVSS score. An attacker with low privileges and high attack complexity could potentially misuse the principals option to affect the authentication process, possibly allowing unauthorized access or manipulation of authentication data.
Can you explain this vulnerability to me?
This vulnerability affects OpenSSH versions before 10.3 and involves improper handling of the authorized_keys principals option. It occurs in uncommon scenarios where a principals list is used together with a Certificate Authority that utilizes comma characters in a specific way.