CVE-2025-68121

10.0 CRITICAL
Published: February 05, 2026 Modified: February 20, 2026
View on NVD

Description

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://go.dev/cl/737700
Source: security@golang.org
Patch
https://go.dev/issue/77217
Source: security@golang.org
Exploit Issue Tracking
https://groups.google.com/g/golang-announce/c/K09ubi9FQFk
Source: security@golang.org
Mailing List Third Party Advisory
https://pkg.go.dev/vuln/GO-2026-4337
Source: security@golang.org
Vendor Advisory

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
10.0 / 10.0
EPSS (Exploit Probability)
0.0%
2th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

golang