CVE-2026-42010

Published: May 3, 2026Last modified: May 11, 2026

Description

A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending a specially crafted username, leading to an authentication bypass. This vulnerability allows an attacker to gain unauthorized access by circumventing the authentication process.

Severity score breakdown

ParameterValue
Base score7.1
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredLOW
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactLOW
Availability impactNONE
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSgnutlsFixed (3.8.13-r0)
25 LTSgnutlsFixed (3.8.13-r0)
StreamgnutlsFixed (3.8.13-r0)

References

ON THIS PAGE