Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3497: CWE-908 Use of Uninitialized Resource in Ubuntu openssh

0
Low
VulnerabilityCVE-2026-3497cvecve-2026-3497cwe-908
Published: Thu Mar 12 2026 (03/12/2026, 18:27:44 UTC)
Source: CVE Database V5
Vendor/Project: Ubuntu
Product: openssh

Description

Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:49:19 UTC

Technical Analysis

CVE-2026-3497 is a vulnerability classified under CWE-908 (Use of Uninitialized Resource) found in the OpenSSH GSSAPI patches applied by various Linux distributions, notably Ubuntu. The flaw stems from the use of sshpkt_disconnect() during error handling in the GSSAPI key exchange process. When an attacker sends an unexpected GSSAPI message type, the server calls an underlying function that continues execution without properly initializing certain connection-related variables. Because these variables are not set to NULL, subsequent code accesses uninitialized memory, leading to undefined behavior that could potentially cause memory corruption or leakage of sensitive information. The vulnerability is specific to patched versions of OpenSSH in Ubuntu (versions 1:10.0p1-5ubuntu5, 1:9.6p1-3ubuntu13, and 1:8.9p1-3) and does not affect the original OpenSSH upstream codebase. The impact is mitigated by compiler hardening flags that vary by distribution and build configuration. The recommended fix is to replace sshpkt_disconnect() with ssh_packet_disconnect(), which properly terminates the process upon error, preventing further execution with uninitialized variables. No public exploits have been reported, and the CVSS 4.0 base score is 2.7, reflecting a low severity due to limited impact and ease of exploitation.

Potential Impact

The vulnerability could lead to undefined behavior such as memory corruption or leakage of sensitive information due to access of uninitialized memory during the GSSAPI key exchange in OpenSSH. Although the flaw does not directly allow remote code execution or privilege escalation, it may destabilize the SSH service or expose memory contents, potentially aiding further attacks. The impact is limited by the need for an attacker to send crafted GSSAPI messages and the absence of authentication requirements. However, since OpenSSH is widely used for secure remote access, any instability or information leakage could disrupt critical operations or compromise confidentiality in affected environments. The overall risk is low but non-negligible for organizations relying on vulnerable Ubuntu OpenSSH versions, especially in high-security or sensitive contexts.

Mitigation Recommendations

1. Apply official security patches from Ubuntu or relevant Linux distributions as soon as they become available to replace sshpkt_disconnect() with ssh_packet_disconnect() in the GSSAPI code path. 2. If patches are not immediately available, consider disabling GSSAPI authentication in OpenSSH configuration to prevent exploitation via GSSAPI message manipulation. 3. Rebuild OpenSSH packages with strict compiler hardening flags (e.g., -fstack-protector, -D_FORTIFY_SOURCE=2) to reduce the risk of memory corruption exploitation. 4. Monitor SSH logs for unusual GSSAPI message types or connection errors indicative of attempted exploitation. 5. Employ network-level controls to restrict SSH access to trusted sources and implement intrusion detection systems tuned to detect anomalous SSH traffic patterns. 6. Regularly update and audit SSH server configurations and software versions to minimize exposure to known vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
canonical
Date Reserved
2026-03-03T19:33:05.664Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b30a4d2f860ef943dbc47e

Added to database: 3/12/2026, 6:47:41 PM

Last enriched: 3/12/2026, 6:49:19 PM

Last updated: 3/14/2026, 2:50:54 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses