Security Risk in OpenSSH File Downloads by Root User
CVE-2026-35385

7.5HIGH

Key Information:

Vendor

OpenBSD

Status
Vendor
CVE Published:
2 April 2026

What is CVE-2026-35385?

A file downloaded using the legacy SCP protocol in OpenSSH versions prior to 10.3 can be mistakenly set with setuid or setgid permissions when executed as a root user. This behavior occurs if the -O option is used without the -p option to preserve file mode, leading to unintended elevation of privileges which can breach system security. Users need to be cautious about the implications of downloading files with such settings, as it could compromise system integrity.

Affected Version(s)

OpenSSH 0 < 10.3

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.