Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/tillitis/tkeyclient
  4. ›
  5. CVE-2026-32953

CVE-2026-32953: Tillitis TKey Client has an Error in Protocol Implementation

March 17, 2026

Some specific (1 out of 256) User Supplied Secrets (USS) were not used, making the resulting Compound Device Identifier (CDI) the same as if no USS was provided.

Affected client applications: all client apps using the tkeyclient Go module.

References

  • github.com/advisories/GHSA-4w7r-3222-8h6v
  • github.com/tillitis/tkeyclient
  • github.com/tillitis/tkeyclient/commit/4954dccf0287657edf8d405057e134cdff9c59e8
  • github.com/tillitis/tkeyclient/releases/tag/v1.3.0
  • github.com/tillitis/tkeyclient/security/advisories/GHSA-4w7r-3222-8h6v
  • nvd.nist.gov/vuln/detail/CVE-2026-32953

Code Behaviors & Features

Detect and mitigate CVE-2026-32953 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.3.0

Fixed versions

  • 1.3.0

Solution

Upgrade to version 1.3.0 or above.

Impact 7.6 HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-303: Incorrect Implementation of Authentication Algorithm

Source file

go/github.com/tillitis/tkeyclient/CVE-2026-32953.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 18 Mar 2026 12:19:37 +0000.