Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

OpenBSD

Source -

CISACNA

BOS Name -

OpenBSD

CNA CVEs -

19

ADP CVEs -

0

CISA CVEs -

1

NVD CVEs -

0
Related CVEsRelated ProductsRelated AssignersReports
20Vulnerabilities found

CVE-2026-41285
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 0.94%
||
7 Day CHG~0.00%
Published-20 Apr, 2026 | 00:00
Updated-24 Apr, 2026 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In OpenBSD through 7.8, the slaacd and rad daemons have an infinite loop when they receive a crafted ICMPv6 Neighbor Discovery (ND) option (over a local network) with length zero, because of an "nd_opt_len * 8 - 2" expression with no preceding check for whether nd_opt_len is zero.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSD
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2026-35414
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.2||MEDIUM
EPSS-0.03% / 9.05%
||
7 Day CHG+0.01%
Published-02 Apr, 2026 | 17:08
Updated-10 Apr, 2026 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.

Action-Not Available
Vendor-OpenBSD
Product-opensshOpenSSH
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2026-35388
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-2.5||LOW
EPSS-0.01% / 1.74%
||
7 Day CHG-0.00%
Published-02 Apr, 2026 | 16:57
Updated-27 Apr, 2026 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.

Action-Not Available
Vendor-OpenBSD
Product-opensshOpenSSH
CWE ID-CWE-420
Unprotected Alternate Channel
CVE-2026-35387
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.1||LOW
EPSS-0.05% / 16.56%
||
7 Day CHG+0.02%
Published-02 Apr, 2026 | 16:52
Updated-27 Apr, 2026 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.

Action-Not Available
Vendor-OpenBSD
Product-opensshOpenSSH
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2026-35386
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.6||LOW
EPSS-0.03% / 10.33%
||
7 Day CHG~0.00%
Published-02 Apr, 2026 | 16:44
Updated-27 Apr, 2026 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.

Action-Not Available
Vendor-OpenBSD
Product-opensshOpenSSH
CWE ID-CWE-696
Incorrect Behavior Order
CVE-2026-35385
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.34%
||
7 Day CHG+0.02%
Published-02 Apr, 2026 | 16:30
Updated-27 Apr, 2026 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

Action-Not Available
Vendor-OpenBSD
Product-opensshOpenSSH
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2025-61984
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.6||LOW
EPSS-0.01% / 1.92%
||
7 Day CHG~0.00%
Published-06 Oct, 2025 | 00:00
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

Action-Not Available
Vendor-OpenBSD
Product-OpenSSH
CWE ID-CWE-159
Improper Handling of Invalid Use of Special Elements
CVE-2025-61985
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.6||LOW
EPSS-0.02% / 4.50%
||
7 Day CHG~0.00%
Published-06 Oct, 2025 | 00:00
Updated-08 Oct, 2025 | 19:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

Action-Not Available
Vendor-OpenBSD
Product-OpenSSH
CWE ID-CWE-158
Improper Neutralization of Null Byte or NUL Character
CVE-2025-32728
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.22% / 44.46%
||
7 Day CHG-0.09%
Published-10 Apr, 2025 | 00:00
Updated-22 May, 2025 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.

Action-Not Available
Vendor-OpenBSDDebian GNU/Linux
Product-debian_linuxopensshOpenSSH
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-30334
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-7.1||HIGH
EPSS-0.22% / 44.36%
||
7 Day CHG~0.00%
Published-20 Mar, 2025 | 20:39
Updated-05 Sep, 2025 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD wg(4) kernel crash

In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kernel crash.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSD
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-11149
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-6.2||MEDIUM
EPSS-0.09% / 25.40%
||
7 Day CHG~0.00%
Published-06 Dec, 2024 | 01:56
Updated-23 Sep, 2025 | 12:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD vmm GDTR limits

In OpenBSD 7.4 before errata 014, vmm(4) did not restore GDTR limits properly on Intel (VMX) CPUs.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSD
CVE-2024-10933
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-4.1||MEDIUM
EPSS-0.12% / 31.01%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 20:06
Updated-23 Sep, 2025 | 12:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD readdir directory traversal

In OpenBSD 7.5 before errata 009 and OpenBSD 7.4 before errata 022, exclude any '/' in readdir name validation to avoid unexpected directory traversal on untrusted file systems.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSD
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-11148
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-8.7||HIGH
EPSS-0.22% / 44.36%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 19:50
Updated-23 Sep, 2025 | 12:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD httpd(8) null dereference

In OpenBSD 7.4 before errata 006 and OpenBSD 7.3 before errata 020, httpd(8) is vulnerable to a NULL dereference when handling a malformed fastcgi request.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSDopenbsd
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2024-10934
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-9.2||CRITICAL
EPSS-0.27% / 50.36%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 19:20
Updated-02 Oct, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD NFS double-free vulnerability

In OpenBSD 7.5 before errata 008 and OpenBSD 7.4 before errata 021, avoid possible mbuf double free in NFS client and server implementation, do not use uninitialized variable in error handling of NFS server.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSDopenbsd
CWE ID-CWE-415
Double Free
CWE ID-CWE-457
Use of Uninitialized Variable
CVE-2021-35000
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-3.3||LOW
EPSS-0.05% / 14.22%
||
7 Day CHG~0.00%
Published-07 May, 2024 | 22:54
Updated-14 Aug, 2025 | 01:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD Kernel Multicast Routing Uninitialized Memory Information Disclosure Vulnerability

OpenBSD Kernel Multicast Routing Uninitialized Memory Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. . Was ZDI-CAN-16112.

Action-Not Available
Vendor-OpenBSD
Product-openbsdKernel
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2021-34999
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-3.8||LOW
EPSS-0.05% / 14.82%
||
7 Day CHG~0.00%
Published-07 May, 2024 | 22:54
Updated-14 Aug, 2025 | 01:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD Kernel Multicast Routing Uninitialized Memory Information Disclosure Vulnerability

OpenBSD Kernel Multicast Routing Uninitialized Memory Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. . Was ZDI-CAN-14540.

Action-Not Available
Vendor-OpenBSD
Product-openbsdKernelopenbsd
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2023-52558
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.88%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 16:33
Updated-10 Oct, 2025 | 17:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD 7.4 and 7.3 m_split() network buffer kernel crash

In OpenBSD 7.4 before errata 002 and OpenBSD 7.3 before errata 019, a network buffer that had to be split at certain length that could crash the kernel after receiving specially crafted escape sequences.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSDopenbsd
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2023-52557
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.19%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 16:14
Updated-10 Oct, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD 7.3 invalid l2tp message npppd crash

In OpenBSD 7.3 before errata 016, npppd(8) could crash by a l2tp message which has an AVP (Attribute-Value Pair) with wrong length.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSDopenbsd
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-805
Buffer Access with Incorrect Length Value
CVE-2023-52556
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-6.2||MEDIUM
EPSS-0.02% / 5.08%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 16:08
Updated-10 Oct, 2025 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD 7.4 pf state race condition kernel crash

In OpenBSD 7.4 before errata 009, a race condition between pf(4)'s processing of packets and expiration of packet states may cause a kernel panic.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSD
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-7247
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-94.11% / 99.91%
||
7 Day CHG~0.00%
Published-29 Jan, 2020 | 15:53
Updated-07 Nov, 2025 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

Action-Not Available
Vendor-n/aCanonical Ltd.OpenBSDDebian GNU/LinuxFedora Project
Product-ubuntu_linuxdebian_linuxopensmtpdfedoran/aOpenSMTPD
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')