CVE-2026-34873
- EPSS 0.04%
- Veröffentlicht 01.04.2026 00:00:00
- Zuletzt bearbeitet 07.04.2026 12:13:36
An issue was discovered in Mbed TLS 3.5.0 through 4.0.0. Client impersonation can occur while resuming a TLS 1.3 session.
CVE-2025-59438
- EPSS 0.04%
- Veröffentlicht 21.10.2025 00:00:00
- Zuletzt bearbeitet 23.10.2025 12:35:35
Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.
CVE-2025-54764
- EPSS 0.02%
- Veröffentlicht 20.10.2025 00:00:00
- Zuletzt bearbeitet 31.10.2025 15:09:59
Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.
CVE-2025-47917
- EPSS 9.91%
- Veröffentlicht 20.07.2025 00:00:00
- Zuletzt bearbeitet 03.11.2025 20:19:05
Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. T...
CVE-2025-49087
- EPSS 0.43%
- Veröffentlicht 20.07.2025 00:00:00
- Zuletzt bearbeitet 07.08.2025 01:21:40
In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.
CVE-2025-48965
- EPSS 0.24%
- Veröffentlicht 20.07.2025 00:00:00
- Zuletzt bearbeitet 03.11.2025 20:19:07
Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.
CVE-2025-52496
- EPSS 0.1%
- Veröffentlicht 04.07.2025 00:00:00
- Zuletzt bearbeitet 03.11.2025 20:19:13
Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.
CVE-2025-49600
- EPSS 0.05%
- Veröffentlicht 04.07.2025 00:00:00
- Zuletzt bearbeitet 17.07.2025 15:59:03
In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in...
CVE-2025-49601
- EPSS 0.26%
- Veröffentlicht 04.07.2025 00:00:00
- Zuletzt bearbeitet 17.07.2025 16:00:02
In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbe...
CVE-2025-52497
- EPSS 0.37%
- Veröffentlicht 04.07.2025 00:00:00
- Zuletzt bearbeitet 03.11.2025 20:19:13
Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.