Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4584-1 | openssh security update |
Ubuntu USN |
USN-8222-1 | OpenSSH vulnerabilities |
Sat, 04 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenSSH ECDSA Algorithm Misinterpretation Allows Unintended Keys | OpenSSH: OpenSSH: Information disclosure due to unintended cryptographic algorithm usage |
| Weaknesses | CWE-115 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 03 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenSSH ECDSA Algorithm Misinterpretation Allows Unintended Keys |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms. | |
| First Time appeared |
Openbsd
Openbsd openssh |
|
| Weaknesses | CWE-670 | |
| CPEs | cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openbsd
Openbsd openssh |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-03T13:07:56.358Z
Reserved: 2026-04-02T16:52:52.884Z
Link: CVE-2026-35387
Updated: 2026-04-03T13:07:53.196Z
Status : Analyzed
Published: 2026-04-02T17:16:27.790
Modified: 2026-04-27T14:05:11.273
Link: CVE-2026-35387
OpenCVE Enrichment
Updated: 2026-04-07T07:55:56Z
Debian DLA
Ubuntu USN