<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Openssh — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/openssh/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 10:16:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/openssh/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenSSH GSSAPI Vulnerability Leads to Potential Denial-of-Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-openssh-gssapi-dos/</link><pubDate>Tue, 07 Apr 2026 10:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openssh-gssapi-dos/</guid><description>A remote, anonymous attacker can exploit a vulnerability in OpenSSH GSSAPI and Ubuntu Linux to trigger undefined behavior or a potential denial-of-service attack.</description><content:encoded><![CDATA[<p>A vulnerability exists within the GSSAPI implementation of OpenSSH, potentially affecting Ubuntu Linux systems. According to the BSI advisory published on April 7, 2026, an anonymous remote attacker can exploit this vulnerability. The specifics of the vulnerability are not detailed in the advisory, but successful exploitation could lead to undefined behavior or a denial-of-service condition on the targeted system. This is a significant concern for organizations relying on OpenSSH for secure remote access, as it could disrupt services and impact availability. Further investigation is warranted to understand the root cause and potential mitigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OpenSSH server running on an Ubuntu Linux system with GSSAPI enabled.</li>
<li>Attacker initiates an SSH connection to the target server.</li>
<li>During the GSSAPI authentication exchange, the attacker sends a specially crafted request.</li>
<li>The vulnerable OpenSSH GSSAPI implementation fails to properly handle the malicious request.</li>
<li>The server enters an unstable state due to the unhandled exception or memory corruption.</li>
<li>The OpenSSH process crashes, leading to a denial-of-service.</li>
<li>Repeated exploitation can keep the SSH service unavailable, preventing legitimate users from accessing the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can result in a denial-of-service condition, rendering the affected OpenSSH server unavailable. This can disrupt critical services relying on SSH for remote access and management. The number of potential victims is widespread, affecting any Ubuntu Linux system running a vulnerable version of OpenSSH with GSSAPI enabled. The impact ranges from temporary service outages to prolonged inaccessibility of affected systems, potentially leading to significant operational disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections for unusual SSH traffic patterns, particularly those involving GSSAPI authentication (see the &ldquo;Detect Suspicious SSH GSSAPI Authentication&rdquo; rule).</li>
<li>Review OpenSSH server logs for error messages or crashes occurring during GSSAPI authentication attempts (see the &ldquo;Detect OpenSSH GSSAPI Authentication Failures&rdquo; rule and enable detailed logging).</li>
<li>Investigate any instances of OpenSSH processes crashing or becoming unresponsive, especially after receiving inbound network connections.</li>
<li>Stay informed about future security updates from OpenSSH and Ubuntu Linux that address this vulnerability, and apply them promptly upon release.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>openssh</category><category>gssapi</category><category>denial-of-service</category><category>linux</category></item><item><title>OpenSSH scp Insecure File Permission Vulnerability (CVE-2026-35385)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openssh-scp-setuid/</link><pubDate>Thu, 02 Apr 2026 17:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openssh-scp-setuid/</guid><description>OpenSSH versions before 10.3 allow for the potential installation of setuid or setgid files when using scp to download files as root with the -O option (legacy SCP protocol) and without the -p option (preserve mode), contrary to user expectations.</description><content:encoded><![CDATA[<p>OpenSSH, a suite of secure networking utilities based on the Secure Shell (SSH) protocol, is affected by a vulnerability (CVE-2026-35385) in versions prior to 10.3. The vulnerability arises when using the <code>scp</code> command to download files as the root user with the <code>-O</code> (legacy SCP protocol) option and without the <code>-p</code> option (preserve mode). In this specific scenario, the downloaded file may be inadvertently installed with the setuid or setgid bits set. This behavior contradicts the expectations of some users, potentially leading to privilege escalation or other security misconfigurations. The vulnerability was publicly disclosed on April 2, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to a system where a user has <code>scp</code> installed and configured to connect to a remote server.</li>
<li>The user, operating as root, initiates an <code>scp</code> download using the command <code>scp -O user@host:/path/to/file /local/path/</code>. The <code>-p</code> option is omitted, and the <code>-O</code> flag is used, triggering the legacy SCP protocol.</li>
<li>The remote server serves the file <code>/path/to/file</code>. This file could have the setuid or setgid bits set.</li>
<li><code>scp</code>, due to the vulnerability, incorrectly handles the file permissions during the download process.</li>
<li>The downloaded file is placed at <code>/local/path/</code> with the setuid or setgid bits unexpectedly preserved from the remote server.</li>
<li>A local user executes the downloaded file <code>/local/path/</code>.</li>
<li>If the setuid or setgid bit is set, the process executes with elevated privileges, potentially leading to unauthorized access or modification of system resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unintended privilege escalation on the affected system. If a user downloads a file with the setuid bit set, an attacker could potentially execute the file with the privileges of the file owner (typically root). While the vulnerable scenario requires the user to be root and explicitly use the <code>-O</code> flag without <code>-p</code>, it can still represent a significant risk in environments where legacy SCP usage is prevalent or where users are unaware of the implications of these options. This scenario may affect a limited number of users who are using the specific vulnerable configuration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenSSH to version 10.3 or later to patch the vulnerability (<a href="https://www.openssh.org/releasenotes.html#10.3p1)">https://www.openssh.org/releasenotes.html#10.3p1)</a>.</li>
<li>Avoid using the <code>-O</code> option (legacy SCP protocol) with <code>scp</code>, especially when downloading files as the root user. Use <code>sftp</code> or <code>rsync</code> as a more secure alternative.</li>
<li>Always use the <code>-p</code> option to preserve file permissions when downloading files with <code>scp</code> to ensure that the downloaded file&rsquo;s permissions are explicitly controlled.</li>
<li>Deploy the Sigma rule provided below to detect the usage of <code>scp</code> with the <code>-O</code> flag, which is indicative of using the vulnerable legacy protocol.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>openssh</category><category>scp</category><category>privilege-escalation</category><category>cve-2026-35385</category></item><item><title>OpenSSH Vulnerabilities Allow Local Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-03-openssh-code-execution/</link><pubDate>Tue, 24 Mar 2026 10:30:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openssh-code-execution/</guid><description>A local attacker can exploit multiple vulnerabilities in OpenSSH to execute arbitrary code, potentially leading to privilege escalation and system compromise.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in OpenSSH that could allow a local attacker to execute arbitrary code. The specific details of these vulnerabilities are not provided in the source document but the potential impact is significant, especially on systems where OpenSSH is used to manage critical infrastructure or sensitive data. Exploitation would require a local presence on the targeted system, and successful exploitation could grant the attacker elevated privileges and the ability to install malware, exfiltrate data, or disrupt services. This impacts any system using OpenSSH.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial local access to the target system through some unspecified means (e.g., compromised account, physical access).</li>
<li>The attacker identifies a vulnerable version of OpenSSH running on the system.</li>
<li>The attacker leverages a specific vulnerability in OpenSSH to inject and execute arbitrary code. This step is vulnerability-specific and the method varies.</li>
<li>The injected code executes within the context of the OpenSSH process.</li>
<li>The attacker escalates privileges by exploiting further vulnerabilities or misconfigurations accessible through the OpenSSH process.</li>
<li>The attacker installs persistent backdoors or implants to maintain access to the compromised system.</li>
<li>The attacker moves laterally to other systems within the network, leveraging the compromised system as a pivot point.</li>
<li>The attacker exfiltrates sensitive data or disrupts critical services, depending on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these OpenSSH vulnerabilities could lead to complete system compromise, including unauthorized access to sensitive data, installation of malware, and disruption of critical services. While the number of victims and specific sectors targeted are currently unknown, the widespread use of OpenSSH makes this a potentially high-impact threat. A successful attack could result in significant financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for unusual child processes spawned by sshd, looking for unexpected command-line arguments, using the <code>Detect Suspicious SSHD Child Processes</code> Sigma rule.</li>
<li>Enable and review OpenSSH audit logging to identify suspicious activity related to authentication and session management (log source).</li>
<li>Investigate any anomalous file modifications or network connections originating from the sshd process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openssh</category><category>code-execution</category><category>privilege-escalation</category></item><item><title>Proxy Execution via Windows OpenSSH Client</title><link>https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</guid><description>Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.</description><content:encoded><![CDATA[<p>This detection identifies attempts to execute commands through a proxy using the Windows OpenSSH client (ssh.exe or sftp.exe). Attackers may abuse this behavior to evade application control policies by leveraging the trusted Windows OpenSSH binaries. The technique involves using the <code>ProxyCommand</code> or <code>LocalCommand</code> options with the OpenSSH client to execute arbitrary commands on the target system. The rule focuses on detecting command lines containing potentially malicious commands such as PowerShell, schtasks, mshta, msiexec, cmd, or script execution, indicating a possible attempt to bypass security measures. The detection logic is applicable to Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes the Windows OpenSSH client (ssh.exe or sftp.exe) with either the <code>ProxyCommand</code> or <code>LocalCommand</code> option.</li>
<li>The <code>ProxyCommand</code> or <code>LocalCommand</code> parameter specifies a command to be executed locally on the system.</li>
<li>The command includes potentially malicious payloads such as PowerShell commands, scheduled tasks manipulation (schtasks), or execution of other LOLBINs (Living Off the Land Binaries) like mshta or msiexec.</li>
<li>The OpenSSH client executes the specified command.</li>
<li>The malicious command performs actions such as downloading and executing additional payloads, creating scheduled tasks for persistence, or executing arbitrary code.</li>
<li>The attacker achieves their objectives, such as gaining further access to the system, escalating privileges, or deploying malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a complete compromise of the affected system. Attackers can bypass application control mechanisms, execute arbitrary code, and establish persistence. This can result in data theft, system disruption, or further propagation of the attack within the network. The severity of the impact depends on the privileges of the account running the OpenSSH client and the specific actions performed by the malicious commands.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details to capture the execution of ssh.exe and sftp.exe with malicious parameters.</li>
<li>Deploy the Sigma rule <code>Proxy Execution via Windows OpenSSH</code> to your SIEM to detect suspicious OpenSSH client executions with malicious commands in the command line.</li>
<li>Monitor for the creation of child processes from ssh.exe or sftp.exe, as this can indicate the execution of malicious commands specified in the <code>ProxyCommand</code> or <code>LocalCommand</code> options.</li>
<li>Review and restrict the usage of <code>PermitLocalCommand</code> in OpenSSH server configurations to prevent attackers from executing commands locally on the system after a connection is established.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>openssh</category><category>application-control-bypass</category></item></channel></rss>