VulnerabilitiesHIGH

OpenSSH 10.3 - Fixes Shell Injection and Security Flaws

Featured image for OpenSSH 10.3 - Fixes Shell Injection and Security Flaws
CSCyber Security News
OpenSSHshell injectionProxyJumpsecurity hardeningSSH
🎯

Basically, OpenSSH fixed a serious bug that could let hackers take control of systems.

Quick Summary

OpenSSH has released version 10.3, fixing a critical shell injection vulnerability. Administrators must review their configurations to avoid potential security risks. Upgrade now to enhance your SSH security.

What Happened

On April 2, 2026, the OpenSSH project released versions 10.3 and 10.3p1. This update addresses a shell injection vulnerability in the -J (ProxyJump) command-line option. Previously, user and host names passed via this option were not validated, allowing attackers to inject malicious commands if these inputs came from untrusted sources.

Who's Affected

This vulnerability primarily impacts administrators using OpenSSH, especially those who utilize the ProxyJump feature. If your SSH configurations allow user inputs for these options, you are at risk.

What Data Was Exposed

While the vulnerability itself does not expose data directly, it opens the door for attackers to execute arbitrary commands on the server. This could lead to unauthorized access or manipulation of sensitive data.

What You Should Do

Administrators should prioritize upgrading to OpenSSH 10.3. Review your current SSH configurations, particularly those using ProxyJump. Ensure that any user inputs are properly sanitized to prevent exploitation. Additionally, check existing SSH certificates for empty principals, as this update changes how they are handled, preventing potential unauthorized access.

Additional Security Changes

The OpenSSH 10.3 release also includes several security-hardening changes. One significant alteration is the handling of SSH certificates. Previously, certificates with an empty principals section acted as wildcards, allowing any user to authenticate if they trusted the issuing Certificate Authority (CA). This behavior has been corrected to prevent accidental broad access.

Legacy Compatibility

OpenSSH has dropped backward compatibility for SSH implementations that do not support transport-layer rekeying. This means that legacy clients or servers may face issues when trying to connect with OpenSSH if they cannot handle rekeying. This change enhances protocol compliance and strengthens security for long-lived sessions.

Conclusion

The OpenSSH 10.3 release is a crucial update that addresses serious vulnerabilities and enhances security measures. Administrators should act swiftly to implement these changes and review their configurations to ensure continued security in their SSH infrastructure.

🔒 Pro insight: The shell injection flaw underscores the importance of input validation in command-line tools; ensure robust sanitization in all configurations.

Original article from

CSCyber Security News· Guru Baran
Read Full Article

Related Pings

CRITICALVulnerabilities

CVE-2025-55182 - Hackers Breach 766 Next.js Hosts

Hackers have exploited a critical vulnerability in Next.js, breaching 766 hosts and stealing sensitive credentials. Organizations must take swift action to mitigate risks and secure their systems.

The Hacker News·
HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

Security Affairs·
CRITICALVulnerabilities

Critical Vulnerability Found in Claude Code After Source Leak

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

SecurityWeek·