1. Home
  2. System Administration
  3. OpenSSH Vulnerability (March 12, 2026) – Checking and Mitigating on Variphy Appliances

OpenSSH Vulnerability (March 12, 2026) – Checking and Mitigating on Variphy Appliances

Applies to:

  • Variphy administrators.
  • IT professionals managing Variphy OVA appliances.
  • Security or infrastructure teams responsible for Linux appliance maintenance.

Issue:

  • A vulnerability related to OpenSSH was published on March 12, 2026.
  • The vulnerability is classified as medium to high severity depending on the Linux distribution implementation.
  • Variphy appliances run Ubuntu, which classifies the vulnerability as medium severity.
  • Administrators may need to determine whether their appliance is patched or apply a temporary workaround.

Determining if your Variphy appliance is affected

Log into the command line interface for the appliance, and run “sshd -V”. If the version is one of the following, the patch has been applied:

  • 24.04 LTS (noble) SSH 9.6p1
  • 22.04 LTS (jammy) SSH 8.9p1
  • 20.04 LTS (focal) SSH 8.2p1 (only available with Ubuntu Pro; Variphy strongly recommends upgrading Ubuntu to 22 or 24 as soon as possible)

As a temporary compensating control, you can edit the sshd configuration file to disable the vulnerable function using the below steps:

  • At the CLI prompt, run “sudo cat /etc/ssh/sshd_config” and look for the line “GSSAPIAuthentication” and ensure it’s set to “no” AND that it is NOT commented out
    • i.e. “#GSSAPIAuthentication no” means that it is still enabled; remove the # to implement the workaround and ensure GSSAPIAuthentication is disabled
  • Restart the sshd service by running “sudo systemctl restart sshd”

Still Need Help?

Email our support team at support@variphy.com or click the button below to access our ticket portal.

Please provide details about your question or issue, including any applicable screenshots, reports, or Variphy application log files.

Updated on March 13, 2026

Was this article helpful?

Related Articles