CVE-2025-68121 — Improper Certificate Validation in Standard Library Crypto TLS
Severity
10.0CRITICALNVD
GHSA7.5OSV7.5
EPSS
0.0%
top 95.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 5
Latest updateMar 23
Description
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a se…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages7 packages
Patches
🔴Vulnerability Details
11OSV▶
Terraform Provider for ArgoCD has possible exposure to GO-2026-4337 / CVE-2025-68121 in github.com/argoproj-labs/terraform-provider-argocd↗2026-03-23
GHSA
▶
📋Vendor Advisories
3🕵️Threat Intelligence
2💬Community
1Bugzilla▶
CVE-2025-68121 crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption↗2026-02-05