CVE-2026-39831 - Invoking bypass of FIDO/U2F security keys physical interaction in golang.org/x/crypto/ssh
CVE ID :CVE-2026-39831
Published : May 22, 2026, 4:16 a.m. | 42 minutes ago
Description :The Verify() method for FIDO/U2F security key types (sk-ecdsa-sha2-nistp256@openssh.com, sk-ssh-ed25519@openssh.com) did not check the User Presence flag. Signatures generated without physical touch were accepted, allowing unattended use of a hardware security key. To restore the previous behavior, return a "no-touch-required" extension in Permissions.Extensions from PublicKeyCallback.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : May 22, 2026, 4:16 a.m. | 42 minutes ago
Description :The Verify() method for FIDO/U2F security key types (sk-ecdsa-sha2-nistp256@openssh.com, sk-ssh-ed25519@openssh.com) did not check the User Presence flag. Signatures generated without physical touch were accepted, allowing unattended use of a hardware security key. To restore the previous behavior, return a "no-touch-required" extension in Permissions.Extensions from PublicKeyCallback.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...