Impact
The bug resides in the session resumption path of Go's crypto/tls library. If a configuration object is altered after a successful handshake – for instance by cloning the Config or using GetConfigForClient – the renewed handshake may proceed even though the new configuration would not have permitted the original connection. This flaw is mapped to CWE-295, indicating improper certificate validation. The result is that a client may resume a session with a server it would not have connected to initially, or a server may resume with a client that would otherwise be rejected.
Affected Systems
Vulnerable systems are those running Go 1.26.0 release candidates 1 and 2, or any builds that include the unpatched crypto/tls package. The flaw affects the standard library's TLS implementation and may impact any Go application that relies on session resumption in secure communication.
Risk and Exploitability
CVSS score 9.1 indicates critical severity, but the EPSS score <1% suggests low likelihood of exploitation at this time. The vulnerability is not yet listed in CISA's KEV catalog. Attackers would need to be able to influence the TLS configuration between handshakes or have control over the configuration flow, making the attack vector indirect. However, the flaw exposes a subtle trust slip that could enable unauthorized session resumption if the application does not enforce a static configuration per session.
OpenCVE Enrichment