Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
- Last update: 29/04/2026
- Affected software: OpenSSH before 10.3
- Type: Authentication bypass
- CVE/CVSS: CVSS 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
OpenSSH is used for remotely managing servers, making it a prime target for attackers. A vulnerability discovered in OpenSSH has been present in nearly all versions released over the past 15 years.
A successful attack grants an intruder root (administrator) access to affected servers, meaning they could execute commands, steal sensitive data, tamper with systems, or cause significant downtime disrupting business operations. Updating OpenSSH to version 10.3 or later should be treated as a priority.
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios that involve a principals list in conjunction with a Certificate Authority that makes certain use of comma characters. This condition only applies to user-trusted CA keys in authorized_keys, the main certificate authentication path is not affected.
It is worth noting that an attack will not leave traces in the logs. Since log-based detection is ineffective here, deploy host-based intrusion detection and file integrity monitoring to catch signs of compromise.
OpenSSH has not reported any active exploitation of this vulnerability.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.