Show filters
45 Total Results
Displaying 1-10 of 45
Sort by:
Attacker Value
Unknown
CVE-2024-45159
Disclosure Date: September 05, 2024 (last updated September 20, 2024)
An issue was discovered in Mbed TLS 3.x before 3.6.1. With TLS 1.3, when a server enables optional authentication of the client, if the client-provided certificate does not have appropriate values in if keyUsage or extKeyUsage extensions, then the return value of mbedtls_ssl_get_verify_result() would incorrectly have the MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_KEY_USAGE bits clear. As a result, an attacker that had a certificate valid for uses other than TLS client authentication would nonetheless be able to use it for TLS client authentication. Only TLS 1.3 servers were affected, and only with optional authentication (with required authentication, the handshake would be aborted with a fatal alert).
0
Attacker Value
Unknown
CVE-2024-45157
Disclosure Date: September 05, 2024 (last updated September 13, 2024)
An issue was discovered in Mbed TLS before 2.28.9 and 3.x before 3.6.1, in which the user-selected algorithm is not used. Unlike previously documented, enabling MBEDTLS_PSA_HMAC_DRBG_MD_TYPE does not cause the PSA subsystem to use HMAC_DRBG: it uses HMAC_DRBG only when MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG and MBEDTLS_CTR_DRBG_C are disabled.
0
Attacker Value
Unknown
CVE-2024-23775
Disclosure Date: January 31, 2024 (last updated February 09, 2024)
Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2, allows attackers to cause a denial of service (DoS) via mbedtls_x509_set_extension().
0
Attacker Value
Unknown
CVE-2024-23170
Disclosure Date: January 31, 2024 (last updated February 09, 2024)
An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
0
Attacker Value
Unknown
CVE-2024-23744
Disclosure Date: January 21, 2024 (last updated January 30, 2024)
An issue was discovered in Mbed TLS 3.5.1. There is persistent handshake denial if a client sends a TLS 1.3 ClientHello without extensions.
0
Attacker Value
Unknown
CVE-2023-52353
Disclosure Date: January 21, 2024 (last updated January 30, 2024)
An issue was discovered in Mbed TLS through 3.5.1. In mbedtls_ssl_session_reset, the maximum negotiable TLS version is mishandled. For example, if the last connection negotiated TLS 1.2, then 1.2 becomes the new maximum.
0
Attacker Value
Unknown
CVE-2023-45199
Disclosure Date: October 07, 2023 (last updated October 13, 2023)
Mbed TLS 3.2.x through 3.4.x before 3.5 has a Buffer Overflow that can lead to remote Code execution.
0
Attacker Value
Unknown
CVE-2023-43615
Disclosure Date: October 07, 2023 (last updated November 10, 2023)
Mbed TLS 2.x before 2.28.5 and 3.x before 3.5.0 has a Buffer Overflow.
0
Attacker Value
Unknown
CVE-2021-36647
Disclosure Date: January 17, 2023 (last updated October 08, 2023)
Use of a Broken or Risky Cryptographic Algorithm in the function mbedtls_mpi_exp_mod() in lignum.c in Mbed TLS Mbed TLS all versions before 3.0.0, 2.27.0 or 2.16.11 allows attackers with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) to recover the private keys used in RSA.
0
Attacker Value
Unknown
CVE-2022-46393
Disclosure Date: December 15, 2022 (last updated October 08, 2023)
An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
0