๐Ÿ” CVE Alert

CVE-2026-32283

HIGH 7.5

Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.

Vendor go standard library
Product crypto/tls
Published Apr 8, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for go standard library crypto/tls

Be the first to know when new high vulnerabilities affecting go standard library crypto/tls are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Go standard library / crypto/tls
0 < 1.25.9 1.26.0-0 < 1.26.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
go.dev: https://go.dev/cl/763767 go.dev: https://go.dev/issue/78334 groups.google.com: https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU pkg.go.dev: https://pkg.go.dev/vuln/GO-2026-4870

Credits

Jakub Ciolek - https://ciolek.dev/