What happened
OpenSSH released version 10.3 on April 2, 2026 with multiple security fixes. One of the most important fixes addresses a scenario where attacker-controlled usernames could be expanded in specific SSH client configurations and potentially lead to arbitrary shell command execution.
The release also fixes additional issues affecting certificate principal matching, accepted ECDSA algorithm filtering in sshd, and legacy scp behavior around privilege bits.
Why this matters
OpenSSH is widely deployed on Linux, macOS, servers, developer workstations, and network infrastructure. Even when exploitation conditions are configuration-dependent, these flaws can become high impact in automated environments (jump hosts, scripts, CI/CD runners, and bastion workflows).
In short: if your environment relies on SSH heavily, delayed patching increases risk.
How to check if you’re affected
You are likely affected if you run OpenSSH versions earlier than 10.3.
Check installed version
- Linux/macOS: run
ssh -V - Server side: verify package version for
openssh-clientandopenssh-server
- Linux/macOS: run
Review SSH client config for risky token expansion paths
- Inspect
~/.ssh/configand system SSH configs for complexMatch execusage and%utoken-based logic. - If untrusted input can influence usernames or host arguments in automation, treat as elevated risk.
- Inspect
Check SSH certificate and CA trust usage
- If you use certificate-based auth with custom principals handling, re-validate policy behavior after updating.
Patch and restart where needed
- Upgrade to OpenSSH 10.3 (or vendor backport with equivalent fixes).
- Restart SSH services according to your platform package guidance.
Immediate defensive actions
- Prioritize updates on internet-facing bastions and shared admin hosts.
- Avoid feeding untrusted values into SSH command lines in scripts.
- Review and tighten certificate principal handling and accepted algorithms.
- Audit legacy
scp -Ousage, especially in privileged automation paths.
Sources
- https://www.openssh.org/txt/release-10.3 (primary source)
- https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0391/
Bottom line
If you run OpenSSH in production or automation-heavy environments, update to 10.3 quickly and review configs where user-controlled values could flow into SSH execution paths.
