VulnerabilitiesHIGH

OpenSSH 10.3 - Fixes Shell Injection and Security Flaws

Featured image for OpenSSH 10.3 - Fixes Shell Injection and Security Flaws
CSCyber Security News·Reporting by Guru Baran
📰 2 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, OpenSSH fixed a serious bug that could let hackers take control of systems.

Quick Summary

OpenSSH has released version 10.3, fixing a critical shell injection vulnerability. Administrators must review their configurations to avoid potential security risks. Upgrade now to enhance your SSH security.

What Happened

On April 2, 2026, the OpenSSH project released versions 10.3 and 10.3p1. This update addresses a shell injection vulnerability in the -J (ProxyJump) command-line option. Previously, user and host names passed via this option were not validated, allowing attackers to inject malicious commands if these inputs came from untrusted sources.

Who's Affected

This vulnerability primarily impacts administrators using OpenSSH, especially those who utilize the ProxyJump feature. If your SSH configurations allow user inputs for these options, you are at risk.

What Data Was Exposed

While the vulnerability itself does not expose data directly, it opens the door for attackers to execute arbitrary commands on the server. This could lead to unauthorized access or manipulation of sensitive data.

What You Should Do

Administrators should prioritize upgrading to OpenSSH 10.3. Review your current SSH configurations, particularly those using ProxyJump. Ensure that any user inputs are properly sanitized to prevent exploitation. Additionally, check existing SSH certificates for empty principals, as this update changes how they are handled, preventing potential unauthorized access.

Additional Security Changes

The OpenSSH 10.3 release also includes several security-hardening changes. One significant alteration is the handling of SSH certificates. Previously, certificates with an empty principals section acted as wildcards, allowing any user to authenticate if they trusted the issuing Certificate Authority (CA). This behavior has been corrected to prevent accidental broad access.

Legacy Compatibility

OpenSSH has dropped backward compatibility for SSH implementations that do not support transport-layer rekeying. This means that legacy clients or servers may face issues when trying to connect with OpenSSH if they cannot handle rekeying. This change enhances protocol compliance and strengthens security for long-lived sessions.

Conclusion

The OpenSSH 10.3 release is a crucial update that addresses serious vulnerabilities and enhances security measures. Administrators should act swiftly to implement these changes and review their configurations to ensure continued security in their SSH infrastructure.

🔒 Pro insight: The shell injection flaw underscores the importance of input validation in command-line tools; ensure robust sanitization in all configurations.

Original article from

CSCyber Security News· Guru Baran
Read Full Article

Also covered by

CACanadian Cyber Centre Alerts

OpenSSH security advisory (AV26-312)

Read Article
HEHelp Net Security

OpenSSH 10.3 patches five security bugs and drops legacy rekeying support

Read Article

Related Pings

CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·