Changeflow GovPing Data Privacy & Cybersecurity OpenSSH vulnerabilities allow remote code execu...
Urgent Notice Added Final

OpenSSH vulnerabilities allow remote code execution

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published
Detected
Email

Summary

CERT-FR issued advisory CERTFR-2026-AVI-0391 alerting to multiple vulnerabilities in OpenSSH (versions prior to 10.3) enabling remote code execution and security policy bypass. OpenSSH released version 10.3 with patches. Organizations running OpenSSH should update immediately.

What changed

CERT-FR published security advisory CERTFR-2026-AVI-0391 disclosing multiple vulnerabilities in OpenSSH affecting versions prior to 10.3. The vulnerabilities allow remote code execution and security policy bypass. OpenSSH released version 10.3 addressing these issues on April 2, 2026.

Organizations running OpenSSH should immediately identify affected installations and update to version 10.3 or later. No specific compliance deadline is stated, but immediate patching is critical given the remote code execution risk. Refer to the OpenSSH security bulletin for patch details.

What to do next

  1. Identify all OpenSSH installations in your environment
  2. Update OpenSSH to version 10.3 or later
  3. Apply security patches per OpenSSH bulletin

Archived snapshot

Apr 2, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 02 avril 2026 N° CERTFR-2026-AVI-0391 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans OpenSSH

Gestion du document

| Référence | CERTFR-2026-AVI-0391 |
| Titre | Multiples vulnérabilités dans OpenSSH |
| Date de la première version | 02 avril 2026 |
| Date de la dernière version | 02 avril 2026 |
| Source(s) | Bulletin de sécurité OpenSSH 10.3 du 02 avril 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Contournement de la politique de sécurité
  • Exécution de code arbitraire à distance

Systèmes affectés

  • OpenSSH versions antérieures à 10.3

Résumé

De multiples vulnérabilités ont été découvertes dans OpenSSH. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 02 avril 2026 Version initiale

Get daily alerts for CERT-FR Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-FR.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-FR
Published
April 2nd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
CERTFR-2026-AVI-0391

Who this affects

Applies to
Technology companies Government agencies Telecommunications firms
Industry sector
5112 Software & Technology 9211 Government & Public Administration 5170 Telecommunications
Activity scope
Vulnerability Management Patch Management
Threshold
OpenSSH versions prior to 10.3
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
Cybersecurity
Compliance frameworks
NIST CSF
Topics
Data Privacy Defense & National Security

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!