Skip to main content
Cybersecurity News Kinetic Potential

OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

OpenSSH versions released over the past 15 years are affected by a vulnerability leading to full root shell access, and attacks cannot be spotted via log-based detection, data security firm Cyera says.

Tracked as CVE-2026-35414 (CVSS score of 8.1), the flaw is described as a mishandling of the authorized_keys principals option in certain scenarios involving certificate authorities (CA) that use comma characters.

According to Cyera, because of the bug, a comma in an SSH certificate principal name leads to OpenSSH access control bypass, allowing users to authenticate as root on a vulnerable server, as long as they have a valid certificate from a trusted CA.

“The flaw resides in a code reuse error that accidentally allowed a simple comma in a certificate principal to be interpreted as a list separator by the parser, turning a low-privilege identity into a root credential,” Cyera told SecurityWeek.

“The server considers the authentication legitimate, meaning this attack does not register an authentication failure in logs, making log-based detection highly unreliable,” it added.

CVE-2026-35414, the cybersecurity firm explains, involves the principals list, which includes the usernames that a certificate holder may authenticate as, and the authorized_keys principals, which contain the keys the servers use to trust certificates.

The issue is that a function that handles cipher and key-exchange list negotiation compares comma-separated lists of ciphers during key exchange, splits on the comma, and enables authentication if either fragment matches the principal’s value.

Because of the bug, if a certificate contains the principal deploy,root, OpenSSH splits the comma and enables full root access.

A second function that also checks authorization treats the same principal as a single string and denies access. However, if the string matches, the options that run next result in principal validation being skipped entirely.

“We wrote a test certificate with a literal comma in the principal field, pointed it at a test server, and got root. The whole thing took about twenty minutes from ‘that looks wrong’ to a working exploit,” Cyera says.

Successful exploitation of the vulnerability could provide an attacker with root access to all the servers an organization has, if the vulnerable protocol runs on them, the company says.

CVE-2026-35414 was resolved in early April in OpenSSH version 10.3. Organizations are advised to audit their environments and update to a patched version as soon as possible.

This article was published by Security Week. Please check their website for the original content.

Add new comment

Plain text

  • No HTML tags allowed.
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
20 + 0 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.