A severe, long-standing vulnerability has been discovered in OpenSSH, the ubiquitous tool for secure remote shell access. Tracked as CVE-2026-35414, the flaw is a privilege escalation vulnerability with a CVSS 8.1 score that has existed in the codebase for approximately 15 years. It allows a remote attacker with low-level, valid credentials (in the form of a certificate from a trusted CA) to gain full root shell access on a vulnerable server. The vulnerability stems from an incorrect code reuse error, where a function designed to parse comma-separated lists was improperly used to handle SSH certificate principal names. Exploitation is trivial and, critically, does not generate failed login attempts, making it exceptionally difficult to detect via standard log monitoring. The flaw is patched in OpenSSH version 10.3p1.
The vulnerability lies in the handling of the authorized_keys file's principals option when using SSH certificate-based authentication. The core issue is a logic flaw (CWE-670: Always-Incorrect Control Flow Implementation) where the code responsible for parsing principal names from a certificate incorrectly reuses a function meant for parsing comma-separated cipher lists.
Here's the attack process:
deploy,root.sshd daemon parses the principal field.sshd splits deploy,root at the comma, treating it as a list of two principals: deploy and root.authorized_keys file on the server is configured to trust the CA for the root user, the server will incorrectly grant the attacker a root shell, even if they were only authorized for the deploy principal.This constitutes a classic privilege escalation attack (T1068 - Exploitation for Privilege Escalation). The exploit is simple to execute once the prerequisites are met and provides the highest level of access to the target system.
Security firm Cyera, which discovered the flaw, confirmed they developed a working exploit in under 20 minutes. While there is no public evidence of in-the-wild exploitation at this time, the simplicity of the exploit means that threat actors will likely develop and deploy it quickly. The fact that exploitation is stealthy (not logged as a failure) makes it an attractive target for attackers.
The impact is critical. Gaining full root access on a server allows an attacker to do anything: steal, modify, or delete all data; install persistent backdoors or ransomware; disable security controls; and use the compromised machine as a pivot point to attack other systems on the network. Given that OpenSSH is a foundational component of countless servers across all industries, the potential scope of this vulnerability is massive.
The following patterns may help identify vulnerable or compromised systems:
/etc/ssh/sshd_configTrustedUserCAKeys directives to identify servers using certificate-based authentication.~/.ssh/authorized_keysauthorized_keys files, especially for the root user, for principals= clauses and cert-authority directives.SSH authentication logsPrincipal name with commaDetecting exploitation post-facto is extremely difficult due to the lack of failure logs. Proactive detection is key.
10.3 should be flagged as critical.sshd_config and authorized_keys files across your fleet to identify servers configured for certificate authentication. Prioritize these systems for patching.System File Analysis (D3-SFA) to monitor for unauthorized changes to authorized_keys files.principals restriction to the authorized_keys file for critical accounts like root. For example, adding principals="root" to the root user's authorized_keys entry for a given CA key will explicitly limit it to only accept certificates with the root principal.Application Configuration Hardening (D3-ACH).The primary mitigation is to update OpenSSH to the patched version 10.3p1 or later.
As a temporary workaround, apply strict 'principals' restrictions to the authorized_keys file for critical users like root.
Audit SSH configurations and CA-issued certificates to identify and remediate risky configurations.
Harden SSH configurations by avoiding wildcards and enforcing the principle of least privilege for certificate-based access.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats