Description
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
Published: 2026-04-02
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unintended ECDSA algorithms may be accepted, potentially weakening authentication on OpenSSH servers
Action: Immediate Patch
AI Analysis

Impact

OpenSSH versions before 10.3 misinterpret the presence of any ECDSA algorithm in the PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms configuration as a wildcard for all ECDSA algorithms. This causes the SSH daemon to accept any ECDSA key, including those using insecure or improperly validated curves. The weakness, identified as CWE-670, exposes authentication to potential bypass and compromises the integrity and confidentiality of SSH sessions.

Affected Systems

The vulnerability applies to all releases of OpenBSD OpenSSH prior to version 10.3. Any system—whether running on Unix, Linux, or other POSIX‑like platforms—that relies on these earlier OpenSSH builds is affected.

Risk and Exploitability

The CVSS score of 3.1 indicates a low severity, and no EPSS data is available. The vulnerability is not listed in the CISA KEV catalog, suggesting limited active exploitation. Exploitation would likely require the attacker to influence or modify the server configuration or to supply a key that matches an allowed ECDSA algorithm. While the likelihood of successful exploitation is low, the impact of accepting unintended keys warrants prompt patching to prevent potential authentication compromise.

Generated by OpenCVE AI on April 2, 2026 at 23:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenSSH to version 10.3 or newer
  • If an upgrade is not immediately possible, verify that the PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms configuration entries do not include unintended wildcard ECDSA algorithm patterns

Generated by OpenCVE AI on April 2, 2026 at 23:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title OpenSSH ECDSA Algorithm Misinterpretation Allows Unintended Keys

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
First Time appeared Openbsd
Openbsd openssh
Weaknesses CWE-670
CPEs cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
Vendors & Products Openbsd
Openbsd openssh
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-03T13:07:56.358Z

Reserved: 2026-04-02T16:52:52.884Z

Link: CVE-2026-35387

cve-icon Vulnrichment

Updated: 2026-04-03T13:07:53.196Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T17:16:27.790

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-35387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:21Z

Weaknesses