CVE-2026-26014
- EPSS 0.04%
- Veröffentlicht 11.02.2026 21:16:21
- Zuletzt bearbeitet 25.02.2026 17:40:28
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.0.10 and 3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key a...
CVE-2022-29222
- EPSS 0.3%
- Veröffentlicht 21.05.2022 00:15:12
- Zuletzt bearbeitet 21.11.2024 06:58:45
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are us...
CVE-2022-29189
- EPSS 1.19%
- Veröffentlicht 21.05.2022 00:15:11
- Zuletzt bearbeitet 21.11.2024 06:58:40
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake ...
CVE-2022-29190
- EPSS 0.2%
- Veröffentlicht 21.05.2022 00:15:11
- Zuletzt bearbeitet 21.11.2024 06:58:40
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, an attacker can send packets that sends Pion DTLS into an infinite loop when processing. Version 2.1.4 contains a patch for this issue. There are currently...
CVE-2019-20786
- EPSS 1.22%
- Veröffentlicht 19.04.2020 20:15:11
- Zuletzt bearbeitet 21.11.2024 04:39:21
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.