No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 22 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-296 |
Fri, 22 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 22 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Golang
Golang ssh |
|
| Vendors & Products |
Golang
Golang ssh |
Fri, 22 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-296 |
Fri, 22 May 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Verify() method for FIDO/U2F security key types (sk-ecdsa-sha2-nistp256@openssh.com, sk-ssh-ed25519@openssh.com) did not check the User Presence flag. Signatures generated without physical touch were accepted, allowing unattended use of a hardware security key. To restore the previous behavior, return a "no-touch-required" extension in Permissions.Extensions from PublicKeyCallback. | |
| Title | Invoking bypass of FIDO/U2F security keys physical interaction in golang.org/x/crypto/ssh | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-05-22T18:52:08.344Z
Reserved: 2026-04-07T18:13:03.528Z
Link: CVE-2026-39831
Updated: 2026-05-22T18:51:54.995Z
Status : Received
Published: 2026-05-22T04:16:22.553
Modified: 2026-05-22T04:16:22.553
Link: CVE-2026-39831
No data.
OpenCVE Enrichment
Updated: 2026-05-22T21:00:12Z
No weakness.