Description
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.
Published: 2026-04-02
Score: 2.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

OpenSSH releases prior to 10.3 omit the confirmation step for connection multiplexing sessions that occur in proxy mode. The missing confirmation can allow an attacker to gain knowledge about a session’s establishment process, potentially revealing information about the connection that should have been protected. This weakness aligns with the category of secret information exposure, and it does not directly compromise authentication or disrupt service availability.

Affected Systems

The issue affects OpenBSD OpenSSH installations running any version older than 10.3. Users should check the exact release being used, as no additional sub‑release restrictions are specified, and consider that any pre‑10.3 build might be vulnerable.

Risk and Exploitability

The CVSS score of 2.5 indicates low severity, and neither EPSS nor CISA KEV data point to widespread exploitation. The likely attack vector involves an attacker who can initiate or observe proxy‑mode multiplexing sessions; the precise conditions for successful exploitation are not detailed in the advisory, so the risk remains modest but the vulnerability should be remediated to avoid inadvertent disclosure.

Generated by OpenCVE AI on April 2, 2026 at 23:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenSSH to version 10.3p1 or newer

Generated by OpenCVE AI on April 2, 2026 at 23:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title OpenSSH Multiplexing Confirmation Omission in Proxy Mode

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.
First Time appeared Openbsd
Openbsd openssh
Weaknesses CWE-420
CPEs cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
Vendors & Products Openbsd
Openbsd openssh
References
Metrics cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-02T18:16:41.820Z

Reserved: 2026-04-02T16:57:30.433Z

Link: CVE-2026-35388

cve-icon Vulnrichment

Updated: 2026-04-02T17:46:32.744Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T17:16:27.947

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-35388

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:20Z

Weaknesses