First published: Wed Dec 11 2024(Updated: )
Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/golang.org/x/crypto | <0.31.0 | 0.31.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45337 is rated as a medium severity vulnerability due to potential authorization bypass.
To fix CVE-2024-45337, upgrade to version 0.31.0 or later of golang.org/x/crypto.
CVE-2024-45337 affects applications and libraries that improperly use the ServerConfig.PublicKeyCallback.
Yes, exploiting CVE-2024-45337 could potentially allow unauthorized access, leading to data breaches.
CVE-2024-45337 can be exploited remotely, making it a significant concern for applications exposed to the internet.