CVE-2025-68121
Published: 05 February 2026
Summary
CVE-2025-68121 is a critical-severity Improper Certificate Validation (CWE-295) vulnerability in Golang Go. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-17 (Public Key Infrastructure Certificates) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of the specific flaw in Go's crypto/tls package, preventing exploitation of improper certificate validation during session resumption.
Mandates proper management and verification of PKI certificates, directly countering the bypass of certificate authority validation in mutated TLS configurations during session resumption.
Protects the authenticity of communications sessions, mitigating risks from unauthorized session resumptions with untrusted parties due to TLS config mutations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote TLS certificate validation bypass during session resumption, directly facilitating exploitation of public-facing apps (T1190) and adversary-in-the-middle attacks (T1557) via improper CA trust.
NVD Description
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user…
more
calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
Deeper analysisAI
CVE-2025-68121 is a critical vulnerability (CVSS 10.0, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) associated with CWE-295 (Improper Certificate Validation), published on 2026-02-05. It affects the crypto/tls package in the Go programming language. The flaw arises during TLS session resumption if the underlying TLS Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, causing the resumed handshake to succeed when it should fail. This issue can occur when users call Config.Clone and mutate the returned Config or use Config.GetConfigForClient.
Remote attackers require no privileges or user interaction and can exploit this over the network with low attack complexity. Exploitation enables a client to resume a session with a server it would not have accepted during the initial handshake, or a server to resume with a client it would not have accepted, effectively bypassing intended certificate authority validation. This leads to high impacts on confidentiality, integrity, and availability within the security scope.
The Go project provides mitigation details across its advisories, including a code change at https://go.dev/cl/737700, issue discussion at https://go.dev/issue/77217, an announcement at https://groups.google.com/g/golang-announce/c/K09ubi9FQFk, and a vulnerability entry at https://pkg.go.dev/vuln/GO-2026-4337. Security practitioners using Go's crypto/tls should review these resources for patching and configuration guidance to prevent improper session resumption.
Details
- CWE(s)