CVE-2026-32283
Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.
| Vendor | go standard library |
| Product | crypto/tls |
| Published | Apr 8, 2026 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for go standard library crypto/tls
Be the first to know when new high vulnerabilities affecting go standard library crypto/tls are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Go standard library / crypto/tls
0 < 1.25.9 1.26.0-0 < 1.26.2
References
Credits
Jakub Ciolek - https://ciolek.dev/