CVE-2026-32953
MEDIUMTillitis: TKey Client has an Error in Protocol Implementation
Title source: cnaDescription
Tillitis TKey Client package is a Go package for a TKey client. Versions 1.2.0 and below contain a critical bug in the tkeyclient Go module which causes 1 out of every 256 User Supplied Secrets (USS) to be silently ignored, producing the same Compound Device Identifier (CDI)—and thus the same key material—as if no USS is provided. This happens because a buffer index error overwrites the USS-enabled boolean with the first byte of the USS digest, so any USS whose hash starts with 0x00 is effectively discarded. This issue has been fixed in version 1.3.0. Users unable to upgrade immediately should switch to a USS whose hash does not begin with a zero byte.
Scores
CVSS v3
4.6
EPSS
0.0001
EPSS Percentile
0.3%
Attack Vector
PHYSICAL
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-303
Status
published
Products (3)
tillitis/tkey_client
< 1.3.0
tillitis/tkeyclient
0 - 1.3.0Go
tillitis/tkeyclient
< 1.3.0
Published
Mar 20, 2026
Tracked Since
Mar 20, 2026