Description
Tillitis TKey Client package is a Go package for a TKey client. Versions 1.2.0 and below contain a critical bug in the tkeyclient Go module which causes 1 out of every 256 User Supplied Secrets (USS) to be silently ignored, producing the same Compound Device Identifier (CDI)—and thus the same key material—as if no USS is provided. This happens because a buffer index error overwrites the USS-enabled boolean with the first byte of the USS digest, so any USS whose hash starts with 0x00 is effectively discarded. This issue has been fixed in version 1.3.0. Users unable to upgrade immediately should switch to a USS whose hash does not begin with a zero byte.
Published: 2026-03-20
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Key material collision leading to duplicate keys
Action: Upgrade
AI Analysis

Impact

The Tillitis TKey Client package contains a buffer index error in its Go module that silently discards any User Supplied Secret (USS) whose hash starts with 0x00. This causes the client to treat such a USS as if none were supplied, producing the same Compound Device Identifier (CDI) and identical key material as if no USS had been provided. Consequently, 1 out of every 256 intended USS values are effectively ignored, leading to a collision in key generation. The flaw is a protocol implementation error (CWE-303) that undermines the uniqueness of cryptographic keys and can allow an attacker to force duplicate keys, potentially exposing data encrypted with those keys.

Affected Systems

All instances of the TKey Client Go package with version 1.2.0 and below are affected. The issue was detected in the source code commit 4954dccf0287657edf8d405057e134cdff9c59e8 and is addressed in release v1.3.0, which replaces the faulty buffer handling logic. Users running any earlier releases should therefore consider their installations vulnerable.

Risk and Exploitability

The CVSS score is 4.7, indicating moderate severity. The EPSS score indicates an exploitation probability of 7e-05 (0.007%) and the vulnerability is not listed in the CISA KEV catalog, suggesting no publicly known active exploitation. The attack vector is implicit: an attacker who can supply a USS whose hash digest begins with 0x00 can trigger the collision. Since the flaw exists entirely on the client side, exploitation requires control over the USS rather than network access, leading to a moderate but non-zero risk of key duplication and potential data compromise.

Generated by OpenCVE AI on April 17, 2026 at 11:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest TKey Client version 1.3.0 or newer.
  • If an upgrade cannot be performed immediately, generate and use a USS whose hash digest does not begin with a zero byte.
  • Regenerate all key material and replace any existing CDIs that may have been affected by the collision.

Generated by OpenCVE AI on April 17, 2026 at 11:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4w7r-3222-8h6v Tillitis TKey Client has an Error in Protocol Implementation
History

Thu, 16 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Tillitis tkey Client
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:tillitis:tkey_client:*:*:*:*:*:go:*:*
Vendors & Products Tillitis tkey Client
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Fri, 20 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Tillitis
Tillitis tkeyclient
Vendors & Products Tillitis
Tillitis tkeyclient

Fri, 20 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description Tillitis TKey Client package is a Go package for a TKey client. Versions 1.2.0 and below contain a critical bug in the tkeyclient Go module which causes 1 out of every 256 User Supplied Secrets (USS) to be silently ignored, producing the same Compound Device Identifier (CDI)—and thus the same key material—as if no USS is provided. This happens because a buffer index error overwrites the USS-enabled boolean with the first byte of the USS digest, so any USS whose hash starts with 0x00 is effectively discarded. This issue has been fixed in version 1.3.0. Users unable to upgrade immediately should switch to a USS whose hash does not begin with a zero byte.
Title Tillitis: TKey Client has an Error in Protocol Implementation
Weaknesses CWE-303
References
Metrics cvssV4_0

{'score': 4.7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H'}


Subscriptions

Tillitis Tkey Client Tkeyclient
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T18:08:15.041Z

Reserved: 2026-03-17T00:05:53.285Z

Link: CVE-2026-32953

cve-icon Vulnrichment

Updated: 2026-03-20T16:34:32.594Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T05:16:14.720

Modified: 2026-04-16T13:14:09.187

Link: CVE-2026-32953

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T11:30:16Z

Weaknesses