VulnerabilitiesHIGH

OpenSSH 10.3 - Patches Security Bugs and Drops Rekeying Support

Featured image for OpenSSH 10.3 - Patches Security Bugs and Drops Rekeying Support
HNHelp Net Security
OpenSSHsecurity fixesCVE-2026-5281
🎯

Basically, OpenSSH fixed security issues and stopped supporting old versions.

Quick Summary

OpenSSH 10.3 has launched with five security fixes and dropped support for legacy rekeying. This change affects older SSH implementations, risking compatibility issues. Users should upgrade to avoid vulnerabilities.

What Happened

OpenSSH 10.3 has been released, introducing five critical security fixes along with new features and behavior changes. One of the major changes is the removal of legacy rekeying support, which means older SSH clients and servers that do not support rekeying will fail to interoperate with OpenSSH going forward. This change could disrupt many deployments still using outdated SSH software.

The Flaw

Among the five vulnerabilities patched, one notable issue is a validation timing flaw in the SSH client. This flaw allowed shell metacharacters in usernames to be expanded via % tokens in ssh_config, potentially enabling attackers to execute arbitrary shell commands. Additionally, a bug in sshd led to incorrect matching of authorized keys, which could allow unauthorized access under certain conditions.

What's at Risk

The vulnerabilities primarily affect users who rely on SSH for secure communications. If an attacker can manipulate usernames or exploit the certificate matching bug, they could gain unauthorized access to systems. The removal of legacy rekeying support may also leave older systems vulnerable if they cannot upgrade to compatible versions.

Patch Status

OpenSSH has addressed these vulnerabilities in the 10.3 release. Users are strongly encouraged to upgrade to this version to mitigate risks associated with the identified flaws. The project has also standardized how empty principals in certificates are treated, ensuring better security practices.

Immediate Actions

  • Upgrade to OpenSSH 10.3 to ensure you have the latest security fixes.
  • Verify that your SSH clients and servers support rekeying before upgrading.
  • Review your configurations to ensure they do not expose command-line arguments to untrusted input.

Conclusion

The release of OpenSSH 10.3 marks a significant step in enhancing security while phasing out outdated practices. Users must be proactive in upgrading and ensuring their systems are compatible with the latest standards to maintain secure operations.

🔒 Pro insight: The removal of legacy rekeying support may expose organizations still using outdated SSH implementations to significant security risks.

Original article from

HNHelp Net Security· Anamarija Pogorelec
Read Full Article

Related Pings

HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

Security Affairs·
CRITICALVulnerabilities

Critical Vulnerability Found in Claude Code After Source Leak

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-3502 - CISA Adds New Exploited Vulnerability

CISA has added a new vulnerability, CVE-2026-3502, to its KEV Catalog. This flaw affects the TrueConf Client and poses serious risks to federal networks. Timely remediation is essential to prevent exploitation.

CISA Advisories·