CVE-2026-35414
Received Received - Intake
Improper Authorized_Keys Parsing in OpenSSH Before

Publication date: 2026-04-02

Last updated on: 2026-04-10

Assigner: MITRE

Description
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openbsd openssh to 10.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-670 The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

Exploitation of this vulnerability could lead to limited confidentiality and integrity impacts, as indicated by the CVSS score. An attacker with low privileges and high attack complexity could potentially misuse the principals option to affect the authentication process, possibly allowing unauthorized access or manipulation of authentication data.


Can you explain this vulnerability to me?

This vulnerability affects OpenSSH versions before 10.3 and involves improper handling of the authorized_keys principals option. It occurs in uncommon scenarios where a principals list is used together with a Certificate Authority that utilizes comma characters in a specific way.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart