Description
Previously, CVE-2024-45337 fixed an authorization bypass for misused ssh server configurations; if any other type of callback is passed other than public key, then the source-address validation would be skipped.
Published: 2026-05-22
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises when an SSH server in golang.org/x/crypto/ssh receives an authentication callback other than VerifiedPublicKeyCallback. In this scenario, the source-address validation that normally limits which clients may connect is bypassed, allowing any client to authenticate without meeting the intended network restrictions. This represents an authorization bypass that undermines the integrity of access control for the SSH service.

Affected Systems

The flaw affects the golang.org/x/crypto SSH package. Specific version details are not disclosed in the current data, but any deployment of this library that uses custom authentication callbacks is potentially vulnerable.

Risk and Exploitability

EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, meaning there is no confirmed exploit evidence. However, the risk is significant for systems that rely on source-address filtering for security; an attacker capable of supplying a non-public key callback could bypass address restrictions, achieving unauthorized access. The likely attack vector is through a misconfigured SSH server that accepts custom callbacks from clients, which an adversary could supply in a crafted connection attempt.

Generated by OpenCVE AI on May 22, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade golang.org/x/crypto/ssh to the latest released version that includes the fix for the source-address validation bypass
  • Configure the SSH server to use only the VerifiedPublicKeyCallback for authentication callbacks, or remove any custom callbacks that could bypass address validation
  • If an upgrade cannot be performed immediately, disable or restrict the use of non-public key callbacks until a patched library is available

Generated by OpenCVE AI on May 22, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 04:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284

Fri, 22 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description Previously, CVE-2024-45337 fixed an authorization bypass for misused ssh server configurations; if any other type of callback is passed other than public key, then the source-address validation would be skipped.
Title Invoking VerifiedPublicKeyCallback permissions skip enforcement in golang.org/x/crypto/ssh
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-22T02:31:27.894Z

Reserved: 2026-05-15T17:35:00.813Z

Link: CVE-2026-46595

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-22T04:16:25.550

Modified: 2026-05-22T04:16:25.550

Link: CVE-2026-46595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T04:30:25Z

Weaknesses