Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4584-1 | openssh security update |
Ubuntu USN |
USN-8222-1 | OpenSSH vulnerabilities |
Sat, 04 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Setuid/Setgid Elevation via scp in OpenSSH <10.3 | OpenSSH: OpenSSH: Privilege escalation via scp legacy protocol when not preserving file mode |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Setuid/Setgid Elevation via scp in OpenSSH <10.3 |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode). | |
| First Time appeared |
Openbsd
Openbsd openssh |
|
| Weaknesses | CWE-281 | |
| CPEs | cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openbsd
Openbsd openssh |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-03T03:55:44.273Z
Reserved: 2026-04-02T16:30:59.107Z
Link: CVE-2026-35385
Updated: 2026-04-02T17:06:11.715Z
Status : Analyzed
Published: 2026-04-02T17:16:27.450
Modified: 2026-04-27T14:02:23.667
Link: CVE-2026-35385
OpenCVE Enrichment
Updated: 2026-04-03T09:18:32Z
Debian DLA
Ubuntu USN