Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28531: n/a

0
Unknown
VulnerabilityCVE-2023-28531cvecve-2023-28531
Published: Fri Mar 17 2023 (03/17/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:31:53 UTC

Technical Analysis

CVE-2023-28531 is a security vulnerability identified in the ssh-add utility of OpenSSH versions from 8.9 up to but not including 9.3. The vulnerability arises because ssh-add adds smartcard keys to the ssh-agent without applying the intended per-hop destination constraints. Normally, these constraints limit the use of smartcard keys to specific SSH hops or destinations, preventing keys from being forwarded or used beyond their intended scope. Due to this flaw, smartcard keys can be forwarded or used across multiple SSH hops without restriction, increasing the risk of key misuse if an attacker gains access to an intermediate system. This undermines the security model of smartcard-based authentication, which relies on strict control over key usage. The vulnerability does not require user interaction once the key is added, and no authentication bypass is involved, but the lack of constraints can lead to unauthorized key usage. No public exploits or active attacks have been reported to date. The vulnerability affects a wide range of systems using OpenSSH versions 8.9 through 9.2, which are common in many Linux distributions and Unix-like environments. The issue was publicly disclosed on March 17, 2023, but no CVSS score has been assigned yet. The recommended fix is to upgrade to OpenSSH version 9.3 or later, where the per-hop destination constraints are properly enforced when adding smartcard keys to ssh-agent.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of secure remote access systems. Organizations that use OpenSSH with smartcard authentication may inadvertently allow their authentication keys to be forwarded beyond intended boundaries, increasing the attack surface. If an attacker compromises an intermediate host in an SSH chain, they could leverage the forwarded smartcard keys to access additional systems without needing the physical smartcard or PIN, effectively bypassing intended security controls. This can lead to unauthorized access to sensitive systems, data breaches, and lateral movement within networks. Critical infrastructure, government agencies, financial institutions, and enterprises with strict access controls relying on smartcard authentication are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the widespread use of OpenSSH in European IT environments. Failure to address this vulnerability could result in escalated attacks and compromise of high-value assets.

Mitigation Recommendations

1. Upgrade all OpenSSH installations to version 9.3 or later, where the vulnerability is fixed by enforcing per-hop destination constraints on smartcard keys added to ssh-agent. 2. Audit current usage of ssh-agent and smartcard keys to identify any potential misuse or unintended key forwarding. 3. Implement strict SSH session controls and monitoring to detect unusual forwarding or authentication patterns. 4. Limit the use of ssh-agent forwarding where possible, especially in multi-hop SSH scenarios, to reduce exposure. 5. Educate system administrators and users about the risks of key forwarding and proper smartcard usage policies. 6. Review and update security policies to include verification of SSH client and server versions and enforce timely patching. 7. Consider deploying additional multi-factor authentication or hardware security modules that provide stronger key usage constraints. 8. Monitor security advisories for any emerging exploits related to this vulnerability and respond promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-03-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a439b6d939959c8fdd56e

Added to database: 11/4/2025, 6:19:07 PM

Last enriched: 11/4/2025, 6:31:53 PM

Last updated: 11/6/2025, 2:02:41 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats