Arm

Mbed Tls

73 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 01.04.2026 00:00:00
  • Zuletzt bearbeitet 07.04.2026 12:13:36

An issue was discovered in Mbed TLS 3.5.0 through 4.0.0. Client impersonation can occur while resuming a TLS 1.3 session.

  • EPSS 0.04%
  • Veröffentlicht 21.10.2025 00:00:00
  • Zuletzt bearbeitet 23.10.2025 12:35:35

Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 20.10.2025 00:00:00
  • Zuletzt bearbeitet 31.10.2025 15:09:59

Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.

  • EPSS 9.91%
  • Veröffentlicht 20.07.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:19:05

Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. T...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 20.07.2025 00:00:00
  • Zuletzt bearbeitet 07.08.2025 01:21:40

In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.

  • EPSS 0.24%
  • Veröffentlicht 20.07.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:19:07

Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 04.07.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:19:13

Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.

  • EPSS 0.05%
  • Veröffentlicht 04.07.2025 00:00:00
  • Zuletzt bearbeitet 17.07.2025 15:59:03

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in...

  • EPSS 0.26%
  • Veröffentlicht 04.07.2025 00:00:00
  • Zuletzt bearbeitet 17.07.2025 16:00:02

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbe...

  • EPSS 0.37%
  • Veröffentlicht 04.07.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:19:13

Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.