Search Results (65 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-34874 2 Arm, Mbed-tls 2 Mbed Tls, Mbedtls 2026-04-03 7.5 High
An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There is a NULL pointer dereference in distinguished name parsing that allows an attacker to write to address 0.
CVE-2025-66442 2 Arm, Mbed-tls 4 Mbed Tls, Tf-psa-crypto, Mbedtls and 1 more 2026-04-03 5.1 Medium
In Mbed TLS through 4.0.0, there is a compiler-induced timing side channel (in RSA and CBC/ECB decryption) that only occurs with LLVM's select-optimize feature. TF-PSA-Crypto through 1.0.0 is also affected.
CVE-2026-34872 2 Arm, Mbed-tls 3 Mbed Tls, Tf-psa-crypto, Mbedtls 2026-04-03 9.1 Critical
An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Crypto 1.0. There is a lack of contributory behavior in FFDH due to improper input validation. Using finite-field Diffie-Hellman, the other party can force the shared secret into a small set of values (lack of contributory behavior). This is a problem for protocols that depend on contributory behavior (which is not the case for TLS). The attack can be carried by the peer, or depending on the protocol by an active network attacker (person in the middle).
CVE-2020-36421 2 Arm, Debian 2 Mbed Tls, Debian Linux 2025-12-03 5.3 Medium
An issue was discovered in Arm Mbed TLS before 2.23.0. Because of a side channel in modular exponentiation, an RSA private key used in a secure enclave could be disclosed.
CVE-2021-43666 2 Arm, Debian 2 Mbed Tls, Debian Linux 2025-12-02 7.5 High
A Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password's length is 0.
CVE-2024-28960 3 Arm, Fedoraproject, Mbed 5 Mbed Crypto, Mbed Tls, Fedora and 2 more 2025-11-04 8.2 High
An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory.
CVE-2024-23775 1 Arm 1 Mbed Tls 2025-11-04 7.5 High
Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2, allows attackers to cause a denial of service (DoS) via mbedtls_x509_set_extension().
CVE-2024-23170 1 Arm 1 Mbed Tls 2025-11-04 5.5 Medium
An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
CVE-2025-52497 2 Arm, Mbed 2 Mbed Tls, Mbedtls 2025-11-03 4.8 Medium
Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.
CVE-2025-52496 2 Arm, Mbed 2 Mbed Tls, Mbedtls 2025-11-03 7.8 High
Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.
CVE-2025-48965 2 Arm, Mbed 2 Mbed Tls, Mbedtls 2025-11-03 4 Medium
Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.
CVE-2025-47917 2 Arm, Mbed 2 Mbed Tls, Mbedtls 2025-11-03 8.9 High
Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).
CVE-2022-46392 2 Arm, Fedoraproject 2 Mbed Tls, Fedora 2025-11-03 5.3 Medium
An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.
CVE-2021-44732 2 Arm, Debian 2 Mbed Tls, Debian Linux 2025-11-03 9.8 Critical
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.
CVE-2021-36647 1 Arm 1 Mbed Tls 2025-11-03 4.7 Medium
Use of a Broken or Risky Cryptographic Algorithm in the function mbedtls_mpi_exp_mod() in lignum.c in Mbed TLS Mbed TLS all versions before 3.0.0, 2.27.0 or 2.16.11 allows attackers with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) to recover the private keys used in RSA.
CVE-2021-24119 3 Arm, Debian, Fedoraproject 3 Mbed Tls, Debian Linux, Fedora 2025-11-03 4.9 Medium
In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.
CVE-2025-54764 3 Arm, Mbed, Mbed-tls 3 Mbed Tls, Mbed, Mbedtls 2025-10-31 6.2 Medium
Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.
CVE-2025-27810 1 Arm 1 Mbed Tls 2025-10-30 5.4 Medium
Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
CVE-2025-59438 3 Arm, Mbed, Mbed-tls 3 Mbed Tls, Mbed, Mbedtls 2025-10-23 5.3 Medium
Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.
CVE-2025-49087 2 Arm, Mbed 2 Mbed Tls, Mbedtls 2025-08-07 4 Medium
In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.