Description
For certain crafted inputs, a 'ed25519.PrivateKey' was created by casting malformed wire bytes, leading to a panic when used.
Published: 2026-05-22
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A malformed input to the golang.org/x/crypto SSH agent can cause the library to construct an ed25519.PrivateKey from invalid wire bytes, which in turn triggers a panic when the key is used. The panic terminates the affected process, effectively disabling the SSH agent service for the impacted instance. The underlying weakness is an improper handling of malformed data that allows an attacker to crash the application, a classic denial of service scenario.

Affected Systems

The vulnerability affects the golang.org/x/crypto/ssh/agent library provided by the Go community. No specific version ranges are listed in the CNA data, so any installation that uses this library without a subsequent patch is potentially exposed.

Risk and Exploitability

The CVSS score is not provided, and the EPSS score is unavailable, which suggests limited public exploitation data. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote: an adversary can send a specially crafted SSH agent request over the network to trigger the panic. Until an official fix is released, the exposed library can be exploited to perform a DoS attack against any service that relies on the agent, potentially impacting availability of SSH key authentication services.

Generated by OpenCVE AI on May 22, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a patch or upgrade to the latest release of golang.org/x/crypto when it becomes available.
  • If an update cannot be performed immediately, restrict connections to the SSH agent by firewall rules or by binding the agent to trusted addresses only.
  • Add defensive checks around SSH agent communication in your application to validate message formats and detect malformed packets before passing them to the library.

Generated by OpenCVE AI on May 22, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 04:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Fri, 22 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description For certain crafted inputs, a 'ed25519.PrivateKey' was created by casting malformed wire bytes, leading to a panic when used.
Title Invoking pathological inputs can lead to client panic in golang.org/x/crypto/ssh/agent
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-22T02:31:27.986Z

Reserved: 2026-05-15T17:35:00.813Z

Link: CVE-2026-46598

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-22T04:16:26.537

Modified: 2026-05-22T04:16:26.537

Link: CVE-2026-46598

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T04:30:25Z

Weaknesses