Description
When an SSH server authentication callback returned PartialSuccessError with non-nil Permissions, those permissions were silently discarded, potentially dropping certificate restrictions such as force-command after a second factor succeeded. Returning non-nil Permissions with PartialSuccessError now results in a connection error.
Published: 2026-05-22
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises when an SSH server authentication callback returns a PartialSuccessError with a non‑nil Permissions value. In prior releases, these permissions were silently discarded, effectively removing certificate restrictions such as the force‑command requirement after a second factor was accepted. The recent change now triggers a connection error for this case, preventing the silent bypass. It is inferred that, before the fix, an attacker could have leveraged this flaw to bypass certificate restrictions and potentially execute commands that a certificate normally prohibits. The issue represents an improper access control weakness.

Affected Systems

The Go SSH package (golang.org/x/crypto/ssh) is affected. Any application that embeds this package and defines custom authentication callbacks potentially returning PartialSuccessError with Permissions values is vulnerable. No specific version range is provided in the source data.

Risk and Exploitability

The flaw requires control over the SSH server’s authentication callback logic, which is normally limited to trusted application code. It is inferred that an external attacker would need to modify or supply that server-side logic to exploit the vulnerability. No CVSS or EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, indicating that no widespread exploitation has been reported. Because of the local or privileged nature of the required compromise, the overall exploitation likelihood is considered low to moderate at current reporting time.

Generated by OpenCVE AI on May 22, 2026 at 04:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade golang.org/x/crypto/ssh to the latest release that enforces an error when a PartialSuccessError contains non‑nil Permissions
  • Modify any custom authentication callbacks to avoid returning non‑nil Permissions together with a PartialSuccessError
  • If updating is not possible immediately, remove or disable certificate restriction rules that depend solely on server‑side Permissions handling until the library is patched

Generated by OpenCVE AI on May 22, 2026 at 04:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 05:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284

Fri, 22 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description When an SSH server authentication callback returned PartialSuccessError with non-nil Permissions, those permissions were silently discarded, potentially dropping certificate restrictions such as force-command after a second factor succeeded. Returning non-nil Permissions with PartialSuccessError now results in a connection error.
Title Invoking bypass of certificate restrictions in golang.org/x/crypto/ssh
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-22T02:31:26.883Z

Reserved: 2026-04-07T18:13:03.528Z

Link: CVE-2026-39828

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-22T04:16:22.190

Modified: 2026-05-22T04:16:22.190

Link: CVE-2026-39828

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T05:00:11Z

Weaknesses