HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

OpenSSH 10.3 Fixes Five Critical Vulnerabilities and Removes Legacy Rekeying Support, Disrupting Incompatible SSH Deployments

OpenSSH 10.3 addresses five security flaws—including a shell‑injection via usernames and certificate‑principal mismatches—and drops legacy rekeying support, potentially breaking older SSH clients. Organizations must verify vendor patch status and test compatibility to avoid exposure and service disruption.

🛡️ LiveThreat™ Intelligence · 📅 April 03, 2026· 📰 helpnetsecurity.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
5 sector(s)
Actions
4 recommended
📰
Source
helpnetsecurity.com

OpenSSH 10.3 Fixes Five Critical Vulnerabilities and Removes Legacy Rekeying Support, Disrupting Incompatible SSH Deployments

What Happened — OpenSSH 10.3 was released, addressing five security bugs: a shell‑injection flaw via user‑name tokens, a certificate‑principal matching error, improper ECDSA algorithm enforcement, and two behavior changes that tighten certificate handling. The update also drops legacy rekeying support, causing older SSH clients/servers that lack rekeying to fail interoperability.

Why It Matters for TPRM

  • SSH is a foundational protocol for remote administration, CI/CD pipelines, and data‑center connectivity; unpatched implementations expose third‑party environments to command‑execution attacks.
  • The removal of legacy rekeying can break integrations with legacy vendors, creating service‑availability risks for supply‑chain partners.
  • Many regulated industries (finance, healthcare, cloud SaaS) rely on OpenSSH‑based appliances; a vulnerability in a vendor’s stack propagates to your risk posture.

Who Is Affected — Cloud‑infrastructure providers, SaaS platforms, managed service providers, financial services, healthcare IT, and any organization that runs SSH servers or clients on Linux/Unix systems.

Recommended Actions

  • Inventory all assets running OpenSSH ≤ 10.2 and verify upgrade paths to 10.3 or later.
  • Test compatibility with legacy SSH endpoints before applying the patch; consider maintaining a separate bastion for legacy systems.
  • Require vendors to provide proof of patch deployment and rekeying‑support verification.
  • Update hardening guides to disallow user‑supplied usernames containing shell metacharacters.

Technical Notes — The shell‑injection issue stems from a timing flaw in %u token expansion within ssh_config. The certificate‑principal bug mis‑matches principals containing commas, potentially granting unintended access. ECDSA enforcement previously allowed any ECDSA algorithm if one was listed, now correctly restricts to the explicit set. Legacy rekeying code was removed, breaking interoperability with SSH implementations that never implemented the rekeying extension. Source: Help Net Security

📰 Original Source
https://www.helpnetsecurity.com/2026/04/02/openssh-10-3-released/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.