Arm

Mbed Tls

62 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 21.10.2025 00:00:00
  • Zuletzt bearbeitet 23.10.2025 12:35:35

Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 20.10.2025 00:00:00
  • Zuletzt bearbeitet 31.10.2025 15:09:59

Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.

  • EPSS 2.13%
  • Veröffentlicht 20.07.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:19:05

Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. T...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 20.07.2025 00:00:00
  • Zuletzt bearbeitet 07.08.2025 01:21:40

In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.

  • EPSS 0.03%
  • Veröffentlicht 20.07.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:19:07

Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.

  • EPSS 0.05%
  • Veröffentlicht 04.07.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:19:13

Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 04.07.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:19:13

Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.

  • EPSS 0.03%
  • Veröffentlicht 04.07.2025 00:00:00
  • Zuletzt bearbeitet 17.07.2025 16:00:02

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbe...

  • EPSS 0.01%
  • Veröffentlicht 04.07.2025 00:00:00
  • Zuletzt bearbeitet 17.07.2025 15:59:03

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in...

  • EPSS 0.07%
  • Veröffentlicht 25.03.2025 00:00:00
  • Zuletzt bearbeitet 30.10.2025 15:05:35

Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.