Unexpected session resumption in crypto/tls
Summary
| CVE | CVE-2025-68121 |
|---|---|
| State | PUBLISHED |
| Assigner | Go |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-02-05 18:16:10 UTC |
| Updated | 2026-04-29 14:16:16 UTC |
| Description | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake. |
Risk And Classification
Primary CVSS: v3.1 10 CRITICAL from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Problem Types: CWE-295 | CWE-295: Improper Certificate Validation | CWE-295 CWE-295 Improper Certificate Validation
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 10 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| 3.1 | ADP | DECLARED | 9.1 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 9.1 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
ChangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Go Standard Library | Crypto/tls | affected 1.24.13 semver | Not specified |
| CNA | Go Standard Library | Crypto/tls | affected 1.25.0-0 1.25.7 semver | Not specified |
| CNA | Go Standard Library | Crypto/tls | affected 1.26.0-rc.1 1.26.0-rc.3 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| pkg.go.dev/vuln/GO-2026-4337 | [email protected] | pkg.go.dev | Vendor Advisory |
| groups.google.com/g/golang-announce/c/K09ubi9FQFk | [email protected] | groups.google.com | Mailing List, Third Party Advisory |
| go.dev/issue/77217 | [email protected] | go.dev | Exploit, Issue Tracking |
| go.dev/cl/737700 | [email protected] | go.dev | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Coia Prant (github.com/rbqvq) (en)
CNA: Go Security Team (en)
There are currently no legacy QID mappings associated with this CVE.