Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68121: CWE-295: Improper Certificate Validation in Go standard library crypto/tls

0
High
VulnerabilityCVE-2025-68121cvecve-2025-68121cwe-295
Published: Thu Feb 05 2026 (02/05/2026, 17:48:44 UTC)
Source: CVE Database V5
Vendor/Project: Go standard library
Product: crypto/tls

Description

CVE-2025-68121 is a vulnerability in the Go standard library's crypto/tls package involving improper certificate validation during TLS session resumption. If the TLS Config's ClientCAs or RootCAs fields are modified between the initial handshake and the resumed handshake, the resumed session may be accepted when it should be rejected. This can occur when developers clone and mutate Config objects or use GetConfigForClient dynamically. The flaw allows a client or server to resume a session with an endpoint they would not have trusted initially, potentially bypassing intended certificate validation policies. No known exploits are reported yet, and no CVSS score is assigned. The affected versions include Go releases prior to 1. 26. 0-rc. 1. European organizations using Go-based applications that rely on crypto/tls for secure communications could be at risk of unauthorized session resumptions, impacting confidentiality and integrity.

AI-Powered Analysis

AILast updated: 02/05/2026, 18:15:00 UTC

Technical Analysis

CVE-2025-68121 is a security vulnerability identified in the Go programming language's standard library, specifically within the crypto/tls package responsible for implementing TLS protocols. The issue arises during TLS session resumption, a performance optimization allowing clients and servers to reuse previously negotiated session parameters to avoid a full handshake. The vulnerability is triggered if the TLS Config structure's ClientCAs or RootCAs fields are altered between the initial handshake and the resumed handshake. This situation can occur when developers use Config.Clone to duplicate a Config and then mutate the copy, or when Config.GetConfigForClient is used to dynamically provide configurations per client. Because the resumed handshake relies on the mutated Config, it may incorrectly accept a resumed session that would have been rejected during the initial handshake, effectively bypassing certificate validation checks. This improper validation violates CWE-295 (Improper Certificate Validation), potentially allowing an attacker to resume a session with a client or server that should not have trusted the peer, undermining the TLS trust model. The affected versions include all Go versions prior to 1.26.0-rc.1, including 1.25.0-0 and earlier. No public exploits have been reported to date, and no CVSS score has been assigned. The vulnerability impacts the confidentiality and integrity of TLS sessions by enabling unauthorized session resumptions, which could facilitate man-in-the-middle attacks or unauthorized access if exploited. The flaw requires a specific development pattern (mutating Config between handshakes) but does not require user interaction or authentication to exploit once conditions are met.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of TLS communications in applications developed with Go. Since TLS is widely used to secure web services, APIs, and internal communications, improper certificate validation during session resumption could allow attackers to bypass trust checks, potentially leading to unauthorized data access, session hijacking, or man-in-the-middle attacks. This risk is particularly critical for sectors handling sensitive data such as finance, healthcare, and government services. The impact is amplified in environments where Go-based microservices or cloud-native applications are prevalent. Additionally, organizations relying on dynamic TLS configurations or cloning Config objects without strict controls are more vulnerable. The absence of known exploits suggests the vulnerability is not yet actively exploited, but the potential for future attacks remains. Confidentiality and integrity of communications are at risk, while availability impact is minimal unless combined with other attack vectors. The vulnerability could undermine compliance with European data protection regulations if exploited to leak or manipulate personal data.

Mitigation Recommendations

To mitigate CVE-2025-68121, European organizations should: 1) Audit Go applications to identify usage of crypto/tls Config cloning or dynamic configuration via GetConfigForClient, ensuring that ClientCAs and RootCAs fields are not mutated between initial and resumed handshakes. 2) Avoid mutating TLS Config objects after the initial handshake or implement strict immutability controls on these fields. 3) Monitor Go project updates and apply patches or upgrade to Go version 1.26.0 or later once officially released with the fix. 4) Implement additional TLS session resumption controls at the application level, such as disabling session resumption where appropriate or enforcing strict certificate validation policies. 5) Conduct penetration testing and code reviews focused on TLS session management to detect improper usage patterns. 6) Educate developers on secure use of the crypto/tls package and the risks of mutating Config objects post-handshake. 7) Employ network monitoring to detect anomalous TLS session resumptions that deviate from expected behavior. These steps go beyond generic TLS hardening by focusing on the specific mutation patterns that trigger the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-12-15T16:48:04.451Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6984daa9f9fa50a62f30a655

Added to database: 2/5/2026, 6:00:09 PM

Last enriched: 2/5/2026, 6:15:00 PM

Last updated: 2/5/2026, 9:47:15 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats