Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

    April 27, 2026

    AI Agents Linked to OpenAI Are Pretending to Be Human Journalists

    April 27, 2026

    Your Essential Space content can now follow you wherever you go in the Nothing ecosystem

    April 27, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years
    OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years
    Cybersecurity

    OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

    The Tech GuyBy The Tech GuyApril 27, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    OpenSSH versions released over the past 15 years are affected by a vulnerability leading to full root shell access, and attacks cannot be spotted via log-based detection, data security firm Cyera says.

    Advertisement

    Tracked as CVE-2026-35414 (CVSS score of 8.1), the flaw is described as a mishandling of the authorized_keys principals option in certain scenarios involving certificate authorities (CA) that use comma characters.

    According to Cyera, because of the bug, a comma in an SSH certificate principal name leads to OpenSSH access control bypass, allowing users to authenticate as root on a vulnerable server, as long as they have a valid certificate from a trusted CA.

    “The flaw resides in a code reuse error that accidentally allowed a simple comma in a certificate principal to be interpreted as a list separator by the parser, turning a low-privilege identity into a root credential,” Cyera told SecurityWeek.

    “The server considers the authentication legitimate, meaning this attack does not register an authentication failure in logs, making log-based detection highly unreliable,” it added.

    CVE-2026-35414, the cybersecurity firm explains, involves the principals list, which includes the usernames that a certificate holder may authenticate as, and the authorized_keys principals, which contain the keys the servers use to trust certificates.

    Advertisement. Scroll to continue reading.

    The issue is that a function that handles cipher and key-exchange list negotiation compares comma-separated lists of ciphers during key exchange, splits on the comma, and enables authentication if either fragment matches the principal’s value.

    Because of the bug, if a certificate contains the principal deploy,root, OpenSSH splits the comma and enables full root access.

    A second function that also checks authorization treats the same principal as a single string and denies access. However, if the string matches, the options that run next result in principal validation being skipped entirely.

    “We wrote a test certificate with a literal comma in the principal field, pointed it at a test server, and got root. The whole thing took about twenty minutes from ‘that looks wrong’ to a working exploit,” Cyera says.

    Successful exploitation of the vulnerability could provide an attacker with root access to all the servers an organization has, if the vulnerable protocol runs on them, the company says.

    CVE-2026-35414 was resolved in early April in OpenSSH version 10.3. Organizations are advised to audit their environments and update to a patched version as soon as possible.

    Related: OpenSSH Patches Vulnerabilities Allowing MitM, DoS Attacks

    Related: Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access

    Related: Firefox Vulnerability Allows Tor User Fingerprinting

    Related: Cursor AI Vulnerability Exposed Developer Devices

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Incomplete Windows Patch Opens Door to Zero-Click Attacks

    April 27, 2026

    Bitwarden NPM Package Hit in Supply Chain Attack

    April 26, 2026

    Vulnerabilities Patched in CrowdStrike, Tenable Products

    April 26, 2026

    Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US

    April 26, 2026

    US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor

    April 25, 2026

    China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

    April 25, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

    April 27, 2026

    AI Agents Linked to OpenAI Are Pretending to Be Human Journalists

    April 27, 2026

    Your Essential Space content can now follow you wherever you go in the Nothing ecosystem

    April 27, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.