Description
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
Published: 2026-04-02
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure by unintended cryptographic algorithm use
Action: Assess Impact
AI Analysis

Impact

OpenSSH versions prior to 10.3 incorrectly interpret any listing of an ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms as an instruction to accept all ECDSA algorithms. This misinterpretation can expose sensitive cryptographic information, potentially allowing a malicious actor to learn details about accepted key types or infer configuration settings. The weakness is rooted in cryptographic confusion and unexpected behavior described by CWE-115 and CWE-670.

Affected Systems

The vulnerability affects the OpenBSD OpenSSH implementation. All releases before 10.3 are impacted, including OpenSSH 10.2 and earlier. No specific patch versions are listed beyond the recommendation to upgrade to 10.3 or newer.

Risk and Exploitability

The CVSS score of 3.1 indicates a low overall severity, and the EPSS (exploit probability) score is below 1%, suggesting a very low likelihood of exploitation in the wild. The vulnerability is not currently listed in the CISA known exploited vulnerabilities catalog. The attack vector is inferred to be remote via an SSH connection, where an attacker could craft or alter the algorithm list in a client or server configuration to trigger the information disclosure. Because no immediate exploitation code is documented, the risk remains low but the potential for sensitive data exposure exists.

Generated by OpenCVE AI on April 4, 2026 at 03:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenSSH to version 10.3 or later.
  • Verify that PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms do not contain inadvertent ECDSA algorithm entries.

Generated by OpenCVE AI on April 4, 2026 at 03:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Title OpenSSH ECDSA Algorithm Misinterpretation Allows Unintended Keys OpenSSH: OpenSSH: Information disclosure due to unintended cryptographic algorithm usage
Weaknesses CWE-115
References
Metrics threat_severity

None

threat_severity

Low


Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title OpenSSH ECDSA Algorithm Misinterpretation Allows Unintended Keys

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
First Time appeared Openbsd
Openbsd openssh
Weaknesses CWE-670
CPEs cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
Vendors & Products Openbsd
Openbsd openssh
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-03T13:07:56.358Z

Reserved: 2026-04-02T16:52:52.884Z

Link: CVE-2026-35387

cve-icon Vulnrichment

Updated: 2026-04-03T13:07:53.196Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T17:16:27.790

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-35387

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-02T16:52:53Z

Links: CVE-2026-35387 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:55:56Z

Weaknesses