CVE-2026-42010
Awaiting Analysis Awaiting Analysis - Queue
Authentication Bypass in GnuTLS via RSA-PSK NUL Character

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: Red Hat, Inc.

Description
A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending a specially crafted username, leading to an authentication bypass. This vulnerability allows an attacker to gain unauthorized access by circumventing the authentication process.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-07
AI Q&A
2026-05-07
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gnutls gnutls *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-626 The product does not properly handle null bytes or NUL characters when passing data between different representations or components.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker to bypass authentication and gain unauthorized access to systems using GnuTLS with RSA-PSK configuration. Such unauthorized access can lead to exposure or compromise of sensitive data, which may result in non-compliance with data protection regulations like GDPR and HIPAA that require strict access controls and protection of personal or health information.

Therefore, this flaw could negatively impact compliance with common standards and regulations by undermining authentication mechanisms and potentially exposing protected data.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-42010 vulnerability, you should update GnuTLS to a version where the username comparison logic has been corrected to properly handle NUL characters in usernames.

This fix prevents authentication bypass by ensuring usernames are fully compared rather than truncated at NUL characters.


Can you explain this vulnerability to me?

The CVE-2026-42010 vulnerability in GnuTLS is an authentication bypass issue. It occurs because servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) incorrectly match usernames that contain a NUL character with truncated versions of those usernames. This improper handling of NUL characters in usernames allows a remote attacker to send a specially crafted username and bypass the authentication process.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to gain unauthorized access to a system by circumventing the authentication process. Because the server incorrectly matches usernames containing NUL characters with truncated usernames, an attacker can exploit this flaw to bypass authentication controls, potentially leading to unauthorized access to sensitive data or system functions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart