Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical OpenSSH Security Flaw Existed for 15 Years

Critical OpenSSH Security Flaw Existed for 15 Years

Posted on April 27, 2026 By CWS

A longstanding vulnerability in OpenSSH, present for the last 15 years, has been discovered to allow full root shell access without detection through log-based monitoring, according to cybersecurity firm Cyera. This flaw, identified as CVE-2026-35414, has a CVSS score of 8.1, indicating its severity.

Understanding the Vulnerability

The issue arises from the misuse of the authorized_keys principals option in specific scenarios involving certificate authorities using comma characters. This vulnerability permits an attacker to bypass OpenSSH access control and authenticate as root on servers, provided they have a valid certificate from a trusted CA.

Cyera explained that a bug in code handling mistakenly treated a comma within a certificate principal name as a list separator. As a result, a low-privilege identity could be incorrectly elevated to root credentials. This oversight allows the server to process the authentication as legitimate, thus bypassing log-based detection mechanisms.

Technical Details and Impact

The CVE-2026-35414 vulnerability specifically affects the principals list, which includes usernames a certificate holder can authenticate as, and the authorized_keys principals, which are keys that servers trust for authentication. A flaw during the negotiation of cipher and key-exchange lists, where comma-separated lists are split and matched, facilitates this unauthorized access.

In cases where certificates contain principals like deploy,root, the flawed parsing enables root access due to the incorrect splitting by commas. Despite a secondary authorization check that treats the principal as a single string, if it matches, subsequent processes skip principal validation entirely.

Resolution and Recommendations

Cyera demonstrated the exploit by crafting a test certificate with a comma in the principal field, effectively gaining root access on a test server within minutes. This vulnerability could potentially grant attackers root access across an organization’s servers if the vulnerable protocol is in use.

The issue was addressed with the release of OpenSSH version 10.3 in early April. Organizations are strongly urged to audit their systems and update to the latest patched version to mitigate the risk posed by this vulnerability.

As a precaution, it is crucial for IT departments to regularly update their software and perform thorough security audits to ensure that similar vulnerabilities are identified and patched promptly.

Security Week News Tags:authentication bypass, certificate authorities, CVE-2026-35414, cyber attack, Cybersecurity, Cyera, IT security, network security, OpenSSH, OpenSSH update, root access, security vulnerability, software patch, system update

Post navigation

Previous Post: PhantomCore Exploits Russian Video Conferencing Software
Next Post: Malware Campaign Evades Detection with Advanced Techniques

Related Posts

Hacker Conversations: Kunal Agarwal and the DNA of a Hacker Hacker Conversations: Kunal Agarwal and the DNA of a Hacker Security Week News
Chrome to Distrust Chunghwa Telecom and Netlock Certificates Chrome to Distrust Chunghwa Telecom and Netlock Certificates Security Week News
Zoomcar Says Hackers Accessed Data of 8.4 Million Users Zoomcar Says Hackers Accessed Data of 8.4 Million Users Security Week News
House Panel Advances Bills to Enhance Energy Cybersecurity House Panel Advances Bills to Enhance Energy Cybersecurity Security Week News
CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors Security Week News
Ransomware Attack Exploits SmarterMail Vulnerability Ransomware Attack Exploits SmarterMail Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Itron Investigates Cyber Breach Affecting Systems
  • Fake VS Code Extensions Spread GlassWorm v2 Malware
  • Malware Campaign Evades Detection with Advanced Techniques
  • Critical OpenSSH Security Flaw Existed for 15 Years
  • PhantomCore Exploits Russian Video Conferencing Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Itron Investigates Cyber Breach Affecting Systems
  • Fake VS Code Extensions Spread GlassWorm v2 Malware
  • Malware Campaign Evades Detection with Advanced Techniques
  • Critical OpenSSH Security Flaw Existed for 15 Years
  • PhantomCore Exploits Russian Video Conferencing Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark