Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.3

Dropbear SSH Server May Allow Remote Code Execution

UBUNTU-CVE-2026-3706
Summary

A flaw in the Dropbear SSH server could allow an attacker to run unauthorized code on your system if they can connect to your server. This could happen if you're using an outdated version of Dropbear. To stay secure, make sure you have the latest version installed.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
canonical dropbear All versions
canonical dropbear All versions
canonical dropbear All versions
canonical dropbear All versions
canonical dropbear All versions
canonical dropbear All versions
Original title
A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verif...
Original description
A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch.
osv CVSS3.1 3.7
osv CVSS4.0 7.3
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026