Critical OpenSSH Vulnerability CVE-2026-35414 Grants Root Access Due to Principal Parsing Error

Decade-Old OpenSSH Flaw (CVE-2026-35414) Allows Full Root Access, Exploits Hard to Detect

CRITICAL
April 27, 2026
5m read
VulnerabilityPatch Management

Related Entities

Organizations

Cyera

Products & Tech

CVE Identifiers

CVE-2026-35414
HIGH
CVSS:8.1

Full Report

Executive Summary

A severe, long-standing vulnerability has been discovered in OpenSSH, the ubiquitous tool for secure remote shell access. Tracked as CVE-2026-35414, the flaw is a privilege escalation vulnerability with a CVSS 8.1 score that has existed in the codebase for approximately 15 years. It allows a remote attacker with low-level, valid credentials (in the form of a certificate from a trusted CA) to gain full root shell access on a vulnerable server. The vulnerability stems from an incorrect code reuse error, where a function designed to parse comma-separated lists was improperly used to handle SSH certificate principal names. Exploitation is trivial and, critically, does not generate failed login attempts, making it exceptionally difficult to detect via standard log monitoring. The flaw is patched in OpenSSH version 10.3p1.

Vulnerability Details

The vulnerability lies in the handling of the authorized_keys file's principals option when using SSH certificate-based authentication. The core issue is a logic flaw (CWE-670: Always-Incorrect Control Flow Implementation) where the code responsible for parsing principal names from a certificate incorrectly reuses a function meant for parsing comma-separated cipher lists.

Here's the attack process:

  1. An organization uses an internal Certificate Authority (CA) to issue SSH certificates for user authentication.
  2. An attacker, who may be a low-privileged employee or an external actor who has compromised a user's account, gains the ability to request a certificate from this trusted CA.
  3. The attacker requests a certificate with a specially crafted principal name containing a comma, for example, deploy,root.
  4. When the attacker attempts to authenticate to a vulnerable OpenSSH server using this certificate, the server's sshd daemon parses the principal field.
  5. Due to the flaw, sshd splits deploy,root at the comma, treating it as a list of two principals: deploy and root.
  6. If the authorized_keys file on the server is configured to trust the CA for the root user, the server will incorrectly grant the attacker a root shell, even if they were only authorized for the deploy principal.

This constitutes a classic privilege escalation attack (T1068 - Exploitation for Privilege Escalation). The exploit is simple to execute once the prerequisites are met and provides the highest level of access to the target system.

Affected Systems

  • Product: OpenSSH
  • Affected Versions: All versions prior to 10.3.
  • Configurations: Systems using SSH certificate-based authentication with trusted CAs are vulnerable. The risk is highest in environments where multiple principals are managed via certificates.

Exploitation Status

Security firm Cyera, which discovered the flaw, confirmed they developed a working exploit in under 20 minutes. While there is no public evidence of in-the-wild exploitation at this time, the simplicity of the exploit means that threat actors will likely develop and deploy it quickly. The fact that exploitation is stealthy (not logged as a failure) makes it an attractive target for attackers.

Impact Assessment

The impact is critical. Gaining full root access on a server allows an attacker to do anything: steal, modify, or delete all data; install persistent backdoors or ransomware; disable security controls; and use the compromised machine as a pivot point to attack other systems on the network. Given that OpenSSH is a foundational component of countless servers across all industries, the potential scope of this vulnerability is massive.

Cyber Observables — Hunting Hints

The following patterns may help identify vulnerable or compromised systems:

Type
File Path
Value
/etc/ssh/sshd_config
Description
Review this file for TrustedUserCAKeys directives to identify servers using certificate-based authentication.
Type
File Path
Value
~/.ssh/authorized_keys
Description
Inspect authorized_keys files, especially for the root user, for principals= clauses and cert-authority directives.
Type
Log Source
Value
SSH authentication logs
Description
Although exploitation is stealthy, hunt for successful root logins from unexpected source IPs or tied to users who should not have root access. Correlate with CA logs.
Type
Certificate Subject
Value
Principal name with comma
Description
If you have access to your CA's issued certificate logs, search for any certificates issued with a comma in the principal name field.

Detection Methods

Detecting exploitation post-facto is extremely difficult due to the lack of failure logs. Proactive detection is key.

  • Vulnerability Scanning: Use authenticated vulnerability scanners to check the version of OpenSSH running on all systems. Any version before 10.3 should be flagged as critical.
  • Configuration Auditing: Automate the review of sshd_config and authorized_keys files across your fleet to identify servers configured for certificate authentication. Prioritize these systems for patching.
  • CA Log Review: If possible, audit the logs of your SSH Certificate Authority for any issued certificates containing commas in the principal name. This would be a strong indicator of a potential compromise attempt.
  • D3FEND Technique: Utilize System File Analysis (D3-SFA) to monitor for unauthorized changes to authorized_keys files.

Remediation Steps

  1. Patch Immediately: The primary mitigation is to update OpenSSH to version 10.3p1 or later on all affected systems. This should be treated as an emergency change.
  2. Workaround (If Patching is Delayed): As a temporary measure, administrators can add a principals restriction to the authorized_keys file for critical accounts like root. For example, adding principals="root" to the root user's authorized_keys entry for a given CA key will explicitly limit it to only accept certificates with the root principal.
  3. Audit CA and Certificates: After patching, conduct a thorough audit of all certificates issued by your trusted SSH CAs. Revoke any suspicious certificates, especially those with malformed principal names.
  4. Harden SSH Configuration: Review SSH configurations to enforce the principle of least privilege. Avoid using wildcard principals and ensure that certificate-based access is tightly controlled. This aligns with D3FEND's Application Configuration Hardening (D3-ACH).

Timeline of Events

1
April 27, 2026
This article was published

MITRE ATT&CK Mitigations

The primary mitigation is to update OpenSSH to the patched version 10.3p1 or later.

As a temporary workaround, apply strict 'principals' restrictions to the authorized_keys file for critical users like root.

Audit

M1047enterprise

Audit SSH configurations and CA-issued certificates to identify and remediate risky configurations.

Harden SSH configurations by avoiding wildcards and enforcing the principle of least privilege for certificate-based access.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CVE-2026-35414OpenSSHVulnerabilityRoot AccessRCEPrivilege EscalationLinuxPatch Management

📢 Share This Article

Help others stay informed about cybersecurity threats