Mbed Tls

6 CVEs product

Monthly

CVE-2025-52497 MEDIUM PATCH This Month

A security vulnerability in Mbed TLS before 3.6.4 (CVSS 4.8). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Ubuntu Debian Mbed Tls Suse
NVD GitHub
CVSS 3.1
4.8
EPSS
0.1%
CVE-2025-52496 HIGH POC PATCH This Week

Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.

Information Disclosure Ubuntu Debian Mbed Tls Suse
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-49601 MEDIUM PATCH This Month

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.

Information Disclosure Buffer Overflow Ubuntu Debian Mbed Tls +1
NVD GitHub
CVSS 3.1
4.8
EPSS
0.0%
CVE-2025-49600 MEDIUM PATCH This Month

A security vulnerability in MbedTLS 3.3.0 (CVSS 4.9). Remediation should follow standard vulnerability management procedures.

Authentication Bypass Ubuntu Debian Mbed Tls Suse
NVD GitHub
CVSS 3.1
4.9
EPSS
0.0%
CVE-2025-27810 MEDIUM PATCH This Month

Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required. This Use of Uninitialized Resource vulnerability could allow attackers to access uninitialized memory causing crashes or information disclosure.

Authentication Bypass Mbed Tls Suse
NVD GitHub
CVSS 3.1
5.4
EPSS
0.1%
CVE-2025-27809 MEDIUM PATCH This Month

Mbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted certificates for arbitrary hostnames unless the TLS client application calls. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Mbed Tls Suse
NVD GitHub
CVSS 3.1
5.4
EPSS
0.1%
CVE-2025-52497
EPSS 0% CVSS 4.8
MEDIUM PATCH This Month

A security vulnerability in Mbed TLS before 3.6.4 (CVSS 4.8). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Ubuntu Debian +2
NVD GitHub
CVE-2025-52496
EPSS 0% CVSS 7.8
HIGH POC PATCH This Week

Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.

Information Disclosure Ubuntu Debian +2
NVD GitHub
CVE-2025-49601
EPSS 0% CVSS 4.8
MEDIUM PATCH This Month

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.

Information Disclosure Buffer Overflow Ubuntu +3
NVD GitHub
CVE-2025-49600
EPSS 0% CVSS 4.9
MEDIUM PATCH This Month

A security vulnerability in MbedTLS 3.3.0 (CVSS 4.9). Remediation should follow standard vulnerability management procedures.

Authentication Bypass Ubuntu Debian +2
NVD GitHub
CVE-2025-27810
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required. This Use of Uninitialized Resource vulnerability could allow attackers to access uninitialized memory causing crashes or information disclosure.

Authentication Bypass Mbed Tls Suse
NVD GitHub
CVE-2025-27809
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Mbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted certificates for arbitrary hostnames unless the TLS client application calls. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Mbed Tls Suse
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy