Tls

85 CVEs product

Monthly

CVE-2026-32281 PATCH Monitor

Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

Denial Of Service Tls Crypto X509
NVD VulDB
EPSS
0.0%
CVE-2026-32283 PATCH Monitor

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.

Denial Of Service Tls Crypto Tls
NVD VulDB
EPSS
0.0%
CVE-2026-33810 PATCH Monitor

When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

Authentication Bypass Tls Crypto X509
NVD VulDB
EPSS
0.0%
CVE-2026-32144 HIGH PATCH This Week

Erlang OTP public_key module (versions 1.16 through 1.20.3 and 1.17.1.2) fails to cryptographically verify OCSP responder certificate signatures, allowing network attackers to forge OCSP responses with self-signed certificates bearing matching issuer names and OCSPSigning extended key usage. This bypasses certificate revocation checks in SSL/TLS clients using OCSP stapling, enabling man-in-the-middle attackers to present revoked certificates as valid and intercept sensitive communications. Vendor-released patches are available (OTP 28.4.2, 27.3.4.10). CISA SSVC analysis indicates no current exploitation and non-automatable attack requirements, but technical impact is rated total due to potential cryptographic security control bypass. No public exploit identified at time of analysis.

Authentication Bypass Tls Otp
NVD GitHub VulDB
CVSS 4.0
7.6
EPSS
0.0%
CVE-2026-31960 MEDIUM PATCH This Month

Unbounded memory consumption in Quill's Apple notarization process allows denial of service when HTTP responses lack size validation, affecting environments with TLS-intercepting proxies or compromised certificate authorities where response manipulation is possible. An attacker positioned to intercept or modify notarization API responses can return arbitrarily large payloads to exhaust memory and crash the signing process. This impacts corporate networks and environments with trust boundary violations, though exploitation is not feasible under standard HTTPS conditions with proper certificate validation.

Tls Denial Of Service
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-31959 MEDIUM PATCH This Month

Quill before v0.7.1 contains a server-side request forgery vulnerability in its Apple notarization log retrieval functionality that fails to validate URL schemes and destination hosts. Exploitation requires an attacker to intercept or modify API responses, making it primarily a threat in environments with TLS-intercepting proxies, compromised certificate authorities, or other trust boundary violations. An attacker could redirect notarization requests to internal or multicast addresses, potentially exposing sensitive information or accessing restricted resources.

Tls SSRF
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-67034 HIGH This Week

An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacker can inject OS commands into the "name" parameter when deleting SSL credentials through the management interface. [CVSS 8.8 HIGH]

Tls Command Injection
NVD VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-3822 MEDIUM This Month

The Taipower Android application fails to validate TLS/SSL certificates during HTTPS connections, enabling unauthenticated attackers to conduct man-in-the-middle attacks against users. This vulnerability allows adversaries to intercept and modify network traffic without user awareness. No patch is currently available for this medium-severity issue (CVSS 6.5).

Tls Taipower App
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-30852 HIGH POC PATCH This Week

Caddy versions 2.7.5 through 2.11.1 contain a template injection vulnerability in the vars_regexp matcher that allows remote attackers to perform double variable expansion on user-controlled input, enabling disclosure of environment variables and file contents. By injecting placeholders like {env.DATABASE_URL} or {file./etc/passwd} into request headers, an unauthenticated attacker can leak sensitive system information. Public exploit code exists for this vulnerability, which is fixed in version 2.11.2.

Tls Caddy
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-30851 HIGH POC PATCH This Week

Caddy versions 2.10.0 through 2.11.1 fail to strip client-supplied headers in the forward_auth copy_headers directive, enabling authenticated attackers to inject identity headers and escalate privileges. This authentication bypass vulnerability affects deployments relying on Caddy for request forwarding and has public exploit code available. The vulnerability requires valid authentication credentials but allows complete privilege elevation within affected systems.

Tls Privilege Escalation Caddy
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-27944 CRITICAL POC PATCH Act Now

Unauthenticated backup download and RCE in Nginx UI before 2.3.3. EPSS 1.0%. PoC available.

Nginx Tls Nginx Ui Suse
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
1.0%
CVE-2026-26999 HIGH PATCH This Week

Traefik versions before 2.11.38 and 3.6.9 allow remote attackers to cause denial of service by sending incomplete TLS records to TCP routers, which causes the TLS handshake process to hang indefinitely while holding connections open. An unauthenticated attacker can exploit this by opening many stalled connections in parallel to exhaust file descriptors and goroutines, degrading or disabling the proxy service.

Tls Traefik Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-13476 CRITICAL Act Now

Static TLS fingerprint in Rakuten Viber Cloak mode enables tracking despite privacy mode.

Windows Android Tls Viber
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-20106 MEDIUM This Month

Unauthenticated remote attackers can trigger memory exhaustion on Cisco ASA and FTD devices by sending specially crafted packets to the SSL VPN service, exploiting insufficient input validation in the Remote Access SSL VPN, HTTP management, and MUS functionality. Successful exploitation causes a denial of service condition that requires manual device reboot. No patch is currently available.

Cisco Tls Denial Of Service
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-20105 HIGH This Week

Denial of service in Cisco Secure Firewall ASA and FTD Remote Access SSL VPN functionality allows authenticated attackers to exhaust device memory by sending specially crafted packets, forcing a device reload. The vulnerability stems from insufficient input validation on user-supplied data and requires valid VPN credentials to exploit. No patch is currently available.

Cisco Tls Denial Of Service
NVD
CVSS 3.1
7.7
EPSS
0.1%
CVE-2026-20103 HIGH This Week

Denial of service in Cisco Secure Firewall ASA and FTD Remote Access SSL VPN allows unauthenticated remote attackers to exhaust device memory through malformed packets, causing the VPN service to become unresponsive. The vulnerability stems from insufficient input validation on the SSL VPN server and currently has no available patch. While the management interface remains accessible, new VPN connections cannot be established during an attack.

Cisco Tls Denial Of Service
NVD
CVSS 3.1
8.6
EPSS
0.1%
CVE-2026-20100 HIGH This Week

Cisco Secure Firewall ASA and FTD devices are vulnerable to a denial of service attack through the Remote Access SSL VPN feature, where authenticated attackers can trigger unvalidated input processing in the Lua interpreter to force device reloads. The vulnerability stems from insufficient input validation in the Lua interpreter and can be exploited by sending specially crafted HTTP packets over an existing VPN connection. No patch is currently available for this HIGH severity issue (CVSS 7.7).

Cisco Tls Denial Of Service
NVD
CVSS 3.1
7.7
EPSS
0.2%
CVE-2026-20052 MEDIUM This Month

Denial of service in Cisco Secure Firewall Threat Defense via crafted SSL packets allows unauthenticated remote attackers to crash the Snort 3 Detection Engine through a memory management logic error during SSL inspection. An attacker can exploit this vulnerability by sending malicious SSL packets through an established connection, forcing the detection engine to unexpectedly restart and interrupt security monitoring. No patch is currently available for this medium-severity issue.

Cisco Tls Denial Of Service
NVD
CVSS 3.1
5.8
EPSS
0.1%
CVE-2026-20050 MEDIUM This Month

Device reloads in Cisco Secure Firewall Threat Defense can be triggered by unauthenticated remote attackers sending specially crafted TLS 1.2 traffic through the SSL decryption feature, exploiting improper memory management in the Do Not Decrypt exclusion logic. The vulnerability requires specific network conditions and TLS 1.2 traffic to trigger, resulting in denial of service with no authentication required. No patch is currently available for this medium-severity issue affecting Cisco and TLS implementations.

Cisco Tls Denial Of Service
NVD
CVSS 3.1
6.8
EPSS
0.1%
CVE-2026-20006 MEDIUM This Month

Cisco Secure Firewall Threat Defense (FTD) Software is vulnerable to denial of service through improper TLS protocol implementation in the Snort 3 Detection Engine, allowing unauthenticated remote attackers to trigger unexpected restarts by sending crafted TLS packets. Successful exploitation causes the affected device to drop network traffic, creating a DoS condition affecting TLS versions prior to 1.3. No patch is currently available.

Cisco Tls Denial Of Service
NVD
CVSS 3.1
5.8
EPSS
0.1%
CVE-2026-20005 MEDIUM This Month

Snort 3 Detection Engine contains a vulnerability that allows attackers to cause a denial of service (DoS) condition when the Snort 3 Detection Engine rest (CVSS 5.8).

Cisco Tls Denial Of Service
NVD
CVSS 3.1
5.8
EPSS
0.1%
CVE-2026-24695 HIGH This Week

Remote code execution in XWEB Pro firmware versions 1.12.1 and earlier allows authenticated attackers to execute arbitrary commands by injecting malicious input into OpenSSL parameter fields. An attacker with valid credentials can exploit this command injection vulnerability through the utility route to gain complete system compromise. No patch is currently available for affected XWEB 500b Pro and 300d Pro devices.

OpenSSL Tls RCE Command Injection Xweb 500b Pro Firmware +2
NVD GitHub
CVSS 3.1
8.0
EPSS
0.3%
CVE-2026-3100 MEDIUM This Month

Man-in-the-middle attacks in TLS/SSL certificate verification for FTPES/FTPS connections in ADM 4.1.0-4.3.3.ROF1 and 5.0.0-5.1.2.RE51 allow remote attackers to intercept and modify backup data and authentication credentials without patching available. The FTP Backup feature fails to properly validate certificates, enabling network traffic interception and credential compromise during secure file transfers. Affected organizations should implement network segmentation or disable FTPES/FTPS backup functionality until patches become available.

Tls Data Master
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-27590 CRITICAL POC PATCH Act Now

FastCGI path splitting vulnerability in Caddy before 2.11.1 allows request smuggling or path confusion when proxying to FastCGI backends (PHP-FPM). EPSS 0.19% with PoC available.

PHP Tls RCE Caddy Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.2%
CVE-2026-27589 MEDIUM POC PATCH This Month

Caddy versions prior to 2.11.1 allow unauthenticated cross-origin requests to the admin API when origin enforcement is disabled, enabling attackers to remotely reconfigure the server through malicious web content loaded in a victim's browser. Public exploit code exists for this vulnerability, which can be leveraged to modify HTTP server behavior and admin listener settings without user knowledge. The vulnerability affects Caddy and TLS implementations, with no patch currently available for affected versions.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27588 CRITICAL POC PATCH Act Now

Host header case sensitivity bypass in Caddy before 2.11.1. Virtual host routing can be bypassed by using alternate casing in the Host header. PoC available.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-27587 CRITICAL POC PATCH Act Now

Case sensitivity bypass in Caddy web server path matching before 2.11.1. HTTP path matchers can be bypassed using alternate casing on case-insensitive filesystems. PoC available.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-27586 CRITICAL POC PATCH Act Now

TLS error swallowing in Caddy web server before 2.11.1 allows bypassing client certificate authentication. Errors in ClientCAs handling are silenced, potentially accepting invalid client certificates. PoC available.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-27585 MEDIUM POC PATCH This Month

Caddy versions prior to 2.11.1 fail to sanitize backslashes in file path matching, allowing attackers to bypass path-based security controls through specially crafted requests. The vulnerability affects systems with specific Caddy configurations and has public exploit code available. Exploitation requires network access with no authentication, resulting in limited information disclosure or modification of restricted resources.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-70058 HIGH This Week

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in YMFE yapi v1.12.0. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in the HTTPS agent configuration for Axios requests [CVSS 7.4 HIGH]

Tls Yapi
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-70045 HIGH This Week

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in jxcore jxm master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTPS request options when 'jx_obj.IsSecure' is true [CVSS 7.4 HIGH]

Tls Jxm
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-70043 CRITICAL Act Now

Improper certificate validation in Ayms node-To master Node.js module. The application does not properly validate TLS certificates, enabling man-in-the-middle attacks.

Tls
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-26994 MEDIUM PATCH This Month

uTLS versions 1.6.7 and below fail to validate TLS 1.3 downgrade protection mechanisms, allowing network attackers to force ClientHello modifications that cause servers to respond with lower TLS versions while bypassing detection checks. An active attacker can exploit this to downgrade encrypted connections to TLS 1.2 or earlier, potentially exposing traffic to known cryptographic weaknesses. Affected users of uTLS, Red Hat, and other TLS implementations should update to patched versions immediately.

Redhat Tls Utls Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-26327 MEDIUM PATCH This Month

OpenClaw's mDNS/Bonjour discovery beacons transmit unauthenticated TXT records that iOS, macOS, and Android clients treat as authoritative for routing and TLS certificate pinning, allowing an attacker on a shared LAN to advertise a rogue service and redirect connections to attacker-controlled endpoints. An attacker can exploit this to bypass TLS pinning validation and potentially capture Gateway credentials through man-in-the-middle attacks. The vulnerability affects OpenClaw versions prior to 2026.2.14 and requires network proximity but no user interaction.

macOS Android iOS Tls AI / ML +2
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27180 CRITICAL POC THREAT Emergency

MajorDoMo home automation platform is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method without authentication due to improper use of gr() (which reads from $_REQUEST), allowing attackers to redirect update URLs and push malicious code packages.

PHP Tls RCE Majordomo
NVD GitHub
CVSS 3.1
9.8
EPSS
61.8%
Threat
5.3
CVE-2025-65753 HIGH This Week

TLS certification mechanism of Guardian Gryphon v01.06.0006.22 is affected by improper certificate validation (CVSS 7.5).

Tls
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-26214 HIGH This Week

Galaxy FDS Android SDK version 3.0.8 and earlier disable TLS hostname verification by default, allowing attackers to perform man-in-the-middle attacks against applications using the library. All applications leveraging this SDK with default configuration are vulnerable to interception and modification of communications with Xiaomi FDS cloud storage, potentially compromising authentication credentials and file contents. No patch is currently available, and the affected open source project has reached end-of-life status.

Android Apache Tls
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-25961 HIGH POC This Week

SumatraPDF versions 3.5.0 through 3.5.2 fail to validate TLS certificates during software updates and execute installers without signature verification, allowing network attackers to perform man-in-the-middle attacks and inject malicious code. An attacker with any valid TLS certificate can intercept update requests and redirect users to a malicious installer, achieving arbitrary code execution on Windows systems. Public exploit code exists for this vulnerability and no patch is currently available.

Windows Tls Sumatrapdf
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25644 HIGH This Week

DataHub versions prior to 1.3.1.8 are vulnerable to man-in-the-middle attacks during LDAP authentication due to insufficient TLS certificate validation, allowing attackers on the network to intercept and eavesdrop on sensitive authentication credentials. An unauthenticated attacker can downgrade the TLS connection to capture plaintext LDAP credentials without requiring user interaction. No patch is currently available for affected deployments.

Tls Ldap Datahub
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25651 MEDIUM POC PATCH This Month

Client-certificate-auth middleware for Node.js versions 0.2.1 and 0.3.0 fails to validate the Host header when redirecting HTTP requests to HTTPS, enabling attackers to craft malicious redirects that direct users to arbitrary domains. Public exploit code exists for this open redirect vulnerability, and no patch is currently available for affected versions.

Node.js Tls Open Redirect Client Certificate Auth
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-68121 CRITICAL POC PATCH Act Now

Critical certificate validation bypass in Go crypto/tls during session resumption. If ClientCAs or RootCAs fields are mutated between creating the config and resuming a session, the TLS stack uses the modified trust store, potentially accepting certificates from unintended CAs. CVSS 10.0, PoC available, patch available.

Golang Tls Authentication Bypass Go Redhat +1
NVD VulDB
CVSS 3.1
10.0
EPSS
0.0%
CVE-2025-68723 CRITICAL Act Now

Multiple stored XSS vulnerabilities in Axigen Mail Server before 10.5.57 WebAdmin interface allow authenticated administrators to inject persistent malicious scripts that execute in other admin sessions.

Tls XSS Privilege Escalation Axigen Mail Server
NVD GitHub
CVSS 3.1
9.0
EPSS
0.0%
CVE-2025-68721 HIGH This Week

Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access control checks and gain unauthorized access to the SSL Certificates management endpoint (page=sslcerts). [CVSS 8.1 HIGH]

Tls Axigen Mail Server
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-25160 CRITICAL POC PATCH Act Now

Alist file manager has an improper certificate validation vulnerability allowing MITM attacks that could compromise file operations and stored credentials.

Tls Alist Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-24932 MEDIUM This Month

Improper TLS/SSL certificate validation in ADM's DDNS update function (versions 4.1.0-4.3.3.ROF1 and 5.0.0-5.1.1.RCI1) enables remote man-in-the-middle attacks to intercept HTTPS communications and extract sensitive data including user email, MD5 hashed passwords, and device serial numbers. An unauthenticated attacker on the network can exploit this weakness without user interaction to compromise DDNS update credentials. No patch is currently available for affected versions.

Tls Data Master
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-25060 HIGH PATCH This Week

OpenList versions prior to 4.1.10 disable TLS certificate verification by default in storage driver communications, enabling man-in-the-middle attacks where network-positioned attackers can intercept, decrypt, and manipulate all data exchanges with storage backends. This misconfiguration affects any deployment relying on OpenList Frontend's default settings and can be exploited via ARP spoofing, rogue access points, or compromised network infrastructure to redirect traffic to attacker-controlled servers. A patch is available in version 4.1.10 and later.

Tls Openlist Suse
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-1778 MEDIUM PATCH This Month

Amazon SageMaker Python SDK versions prior to v2.256.0 or v3.1.1 disable TLS certificate verification when importing Triton Python models, enabling attackers to perform man-in-the-middle attacks by presenting invalid or self-signed certificates. This vulnerability affects organizations using the affected SDK versions for model imports over HTTPS connections. No patch is currently available for this vulnerability.

Python Tls AI / ML
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2025-61730 MEDIUM PATCH This Month

During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. [CVSS 5.3 MEDIUM]

Tls Information Disclosure Go Suse
NVD VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2022-40620 HIGH POC This Week

FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism. [CVSS 7.7 HIGH]

Netgear Tls R6230 Firmware Rax120 Firmware R8900 Firmware +7
NVD
CVSS 3.1
7.7
EPSS
0.1%
CVE-2026-22796 MEDIUM PATCH This Month

OpenSSL's PKCS#7 signature verification fails to validate ASN1_TYPE union members before access, allowing attackers to trigger null pointer dereference crashes by submitting malformed PKCS#7 data. Applications performing signature verification or using PKCS7_digest_from_attributes() directly are vulnerable to denial of service attacks. A patch is available to address this type confusion vulnerability.

OpenSSL Tls Null Pointer Dereference Denial Of Service Redhat +1
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-22795 MEDIUM PATCH This Month

Processing a malformed PKCS#12 file in OpenSSL and related TLS libraries can trigger a null pointer dereference due to improper type validation in ASN.1 parsing, causing applications to crash. This vulnerability requires local user interaction to exploit and results only in denial of service, with no impact on data confidentiality or integrity. A patch is available to address this medium-severity issue.

OpenSSL Tls Null Pointer Dereference Denial Of Service Redhat +1
NVD GitHub VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-69421 HIGH PATCH This Week

Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. [CVSS 7.5 HIGH]

OpenSSL Tls Null Pointer Dereference Denial Of Service Redhat +1
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-69420 HIGH PATCH This Week

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. [CVSS 7.5 HIGH]

OpenSSL Tls Null Pointer Dereference Denial Of Service Redhat +1
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-69419 HIGH PATCH This Week

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. [CVSS 7.4 HIGH]

OpenSSL Tls Memory Corruption Denial Of Service Redhat +1
NVD GitHub VulDB
CVSS 3.1
7.4
EPSS
0.1%
CVE-2025-69418 MEDIUM PATCH This Month

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. [CVSS 4.0 MEDIUM]

OpenSSL Tls Redhat Suse
NVD GitHub VulDB
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-68160 MEDIUM PATCH This Month

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. [CVSS 4.7 MEDIUM]

OpenSSL Tls Heap Overflow Memory Corruption Denial Of Service +2
NVD GitHub VulDB
CVSS 3.1
4.7
EPSS
0.0%
CVE-2025-66199 MEDIUM PATCH This Month

Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. [CVSS 5.9 MEDIUM]

OpenSSL Tls Memory Corruption Denial Of Service Information Disclosure +2
NVD GitHub VulDB
CVSS 3.1
5.9
EPSS
0.1%
CVE-2025-15469 MEDIUM PATCH This Month

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. [CVSS 5.5 MEDIUM]

OpenSSL Tls Redhat Suse
NVD GitHub VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-15468 MEDIUM PATCH This Month

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. [CVSS 5.9 MEDIUM]

OpenSSL Tls Null Pointer Dereference Denial Of Service Redhat +1
NVD GitHub VulDB
CVSS 3.1
5.9
EPSS
0.1%
CVE-2025-15467 CRITICAL PATCH Act Now

OpenSSL has a critical out-of-bounds write when parsing CMS AuthEnvelopedData/EnvelopedData with malicious AEAD parameters, enabling potential RCE.

OpenSSL Tls RCE Buffer Overflow Stack Overflow +3
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
1.0%
CVE-2025-32057 MEDIUM This Month

The Infotainment ECU manufactured by Bosch which is installed in Nissan Leaf ZE1 - 2020 uses a Redbend service for over-the-air provisioning and updates. HTTPS is used for communication with the back-end server. [CVSS 6.5 MEDIUM]

Tls
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-68133 HIGH POC PATCH This Week

EVerest is an EV charging software stack. In versions 2025.9.0 and below, an attacker can exhaust the operating system's memory and cause the module to terminate by initiating an unlimited number of TCP connections that never proceed to ISO 15118-2 communication. [CVSS 7.4 HIGH]

Tls Everest
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-21926 HIGH This Week

Siebel Customer Relationship Management Deployment contains a vulnerability that allows attackers to unauthorized ability to cause a hang or frequently repeatable crash (complete DO (CVSS 7.5).

Oracle Tls Denial Of Service Siebel Customer Relationship Management Deployment
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-21637 HIGH PATCH This Week

Node.js TLS servers using PSK or ALPN callbacks are vulnerable to denial of service when these callbacks throw unhandled synchronous exceptions during the TLS handshake. Remote attackers can exploit this by sending specially crafted TLS handshake requests to trigger resource exhaustion or process crashes, either through immediate termination or silent file descriptor leaks. No patch is currently available for this vulnerability.

Node.js Tls Denial Of Service Node.Js Redhat +1
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-59464 HIGH PATCH This Week

A memory leak in Node.js’s OpenSSL integration occurs when converting `X.509` certificate fields to UTF-8 without freeing the allocated buffer. [CVSS 7.5 HIGH]

Node.js OpenSSL Tls Denial Of Service Node.Js +2
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-11043 HIGH This Week

An Improper Certificate Validation vulnerability in the OPC-UA client and ANSL over TLS client used in Automation Studio versions up to 6.5 is affected by improper certificate validation (CVSS 7.4).

Tls
NVD
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-22045 MEDIUM PATCH This Month

Denial of service in Traefik versions prior to 2.11.35 and 3.6.7 allows unauthenticated remote attackers to exhaust server resources by establishing incomplete ACME TLS-ALPN connections and leaving them open indefinitely. An attacker can send minimal ClientHello messages with the acme-tls/1 protocol and cease responding, causing goroutines and file descriptors to be held until the entry point becomes unavailable. The vulnerability affects systems with ACME TLS challenge enabled.

Golang Tls Denial Of Service Traefik Redhat +1
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-21917 HIGH This Week

Malformed SSL packets can trigger a Denial-of-Service condition in Juniper SRX devices running Junos OS with UTM Web-Filtering enabled, causing Forwarding Processor Card (FPC) crashes and restarts without requiring authentication. An unauthenticated network-based attacker can exploit this input validation flaw in the Web-Filtering module to disrupt device availability across affected Junos versions (23.2R2-S2 through 24.4R2). No patches are currently available for earlier Junos versions, and affected systems remain vulnerable until updates are applied.

Juniper Tls Denial Of Service Junos
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-21907 MEDIUM This Month

Junos Space versions up to 24.1 is affected by use of a broken or risky cryptographic algorithm (CVSS 5.9).

Juniper Tls Junos Space
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-22771 HIGH POC PATCH This Week

Credential theft via Lua script execution in Envoy Gateway versions before 1.5.7 and 1.6.2 allows authenticated attackers to extract proxy credentials and subsequently access the control plane and all associated secrets including TLS private keys. Public exploit code exists for this vulnerability. Affected organizations running vulnerable Envoy Gateway instances should immediately upgrade as no patch is currently available for intermediate versions.

Kubernetes Tls Gateway Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-22250 LOW PATCH Monitor

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, the SSL verification would be skipped for some crafted URLs. [CVSS 2.5 LOW]

Tls
NVD GitHub
CVSS 3.1
2.5
EPSS
0.0%
CVE-2025-71063 HIGH PATCH This Week

Errands before 46.2.10 does not verify TLS certificates for CalDAV servers. [CVSS 8.2 HIGH]

Tls Errands
NVD GitHub
CVSS 3.1
8.2
EPSS
0.0%
CVE-2025-66001 HIGH PATCH This Week

NeuVector supports login authentication through OpenID Connect. However, the TLS verification (which verifies the remote server's authenticity and integrity) for OpenID Connect is not enforced by default. [CVSS 8.8 HIGH]

Tls Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-14819 MEDIUM PATCH This Month

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. [CVSS 5.3 MEDIUM]

Tls Curl Suse
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-14017 MEDIUM PATCH This Month

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. [CVSS 6.3 MEDIUM]

Tls Ldap Curl Redhat Suse
NVD
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-15346 PATCH This Week

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.

Python Tls
NVD GitHub
EPSS
0.1%
CVE-2025-68637 CRITICAL Act Now

Uniffle HTTP client (before 0.10.0) trusts all SSL certificates and disables hostname verification by default, exposing all REST API communication between the CLI and Coordinator to man-in-the-middle attacks.

Tls Uniffle
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-21444 MEDIUM POC PATCH This Month

Improper IV handling in libtpms 0.10.0 and 0.10.1 causes the library to return initial instead of final initialization vectors during symmetric cipher operations with OpenSSL 3.x, potentially weakening cryptographic security for local users who can interact with the TPM emulation. Public exploit code exists for this vulnerability affecting confidentiality of encrypted data. Update to libtpms 0.10.2 to remediate.

OpenSSL Tls Libtpms Redhat Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-69412 LOW Monitor

KDE messagelib before 25.11.90 ignores SSL errors for threatMatches:find in the Google Safe Browsing Lookup API (aka phishing API), which might allow spoofing of threat data. NOTE: this Lookup API is not contacted in the messagelib default configuration. [CVSS 3.4 LOW]

Tls
NVD GitHub
CVSS 3.1
3.4
EPSS
0.0%
CVE-2025-39682 HIGH PATCH This Week

This vulnerability in the Linux kernel's TLS receive path allows a local attacker with low privileges to cause a denial of service or potentially leak sensitive information in memory. The flaw occurs when handling zero-length TLS records on the rx_list, where the kernel fails to properly handle the corner case of zero-length initial records during zero-copy decryption operations. With an EPSS score of only 0.01% (1st percentile), active exploitation is highly unlikely despite the 7.1 CVSS score, and patches are available from the vendor.

Linux Tls Denial Of Service Debian Linux Linux Kernel +2
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-49812 HIGH PATCH This Week

CVE-2025-49812 is an HTTP request smuggling/desynchronization vulnerability in Apache HTTP Server's mod_ssl that allows man-in-the-middle attackers to hijack HTTPS sessions by exploiting improper handling of TLS upgrades. Only Apache HTTP Server versions through 2.4.63 with 'SSLEngine optional' configurations are affected, enabling session hijacking with high confidentiality and integrity impact. The vulnerability requires network-level access and careful timing but does not require user interaction or privileges; upgrade to 2.4.64 (which removes TLS upgrade support entirely) is the recommended mitigation.

Apache Tls Session Fixation Http Server Redhat +1
NVD
CVSS 3.1
7.4
EPSS
0.1%
CVE-2025-23048 CRITICAL PATCH Act Now

CVE-2025-23048 is an authentication bypass vulnerability in Apache HTTP Server 2.4.35-2.4.63 affecting mod_ssl configurations with multiple virtual hosts using different client certificate restrictions. An attacker with valid client certificates trusted by one virtual host can exploit TLS 1.3 session resumption to access another restricted virtual host if SSLStrictSNIVHostCheck is not enabled, achieving unauthorized access to confidential information and potentially modifying data. This is a network-accessible vulnerability with no authentication required and high real-world impact.

Apache Authentication Bypass Tls Http Server Redhat +1
NVD
CVSS 3.1
9.1
EPSS
0.0%
CVE-2024-47252 HIGH PATCH This Week

CVE-2024-47252 is a security vulnerability (CVSS 7.5). High severity vulnerability requiring prompt remediation.

Apache Information Disclosure Tls Http Server Redhat +1
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-6433 CRITICAL PATCH Act Now

CVE-2025-6433 is a critical WebAuthn specification violation in Firefox and Thunderbird that allows attackers to present WebAuthn authentication challenges over non-secure TLS connections with user-granted exceptions. This bypasses the WebAuthn requirement for secure transport without errors, enabling credential theft and account compromise. Firefox < 140 and Thunderbird < 140 are affected; the network-based attack requires no privileges or user interaction beyond the initial certificate exception grant, resulting in a CVSS 9.8 critical rating.

Mozilla Authentication Bypass Tls Firefox Thunderbird +2
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-41361 HIGH This Week

A remote code execution vulnerability in IDF (CVSS 8.3). High severity vulnerability requiring prompt remediation.

Denial Of Service Tls IoT
NVD
CVSS 4.0
8.3
EPSS
0.1%
CVE-2026-32281
EPSS 0%
PATCH Monitor

Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

Denial Of Service Tls Crypto X509
NVD VulDB
CVE-2026-32283
EPSS 0%
PATCH Monitor

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.

Denial Of Service Tls Crypto Tls
NVD VulDB
CVE-2026-33810
EPSS 0%
PATCH Monitor

When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

Authentication Bypass Tls Crypto X509
NVD VulDB
CVE-2026-32144
EPSS 0% CVSS 7.6
HIGH PATCH This Week

Erlang OTP public_key module (versions 1.16 through 1.20.3 and 1.17.1.2) fails to cryptographically verify OCSP responder certificate signatures, allowing network attackers to forge OCSP responses with self-signed certificates bearing matching issuer names and OCSPSigning extended key usage. This bypasses certificate revocation checks in SSL/TLS clients using OCSP stapling, enabling man-in-the-middle attackers to present revoked certificates as valid and intercept sensitive communications. Vendor-released patches are available (OTP 28.4.2, 27.3.4.10). CISA SSVC analysis indicates no current exploitation and non-automatable attack requirements, but technical impact is rated total due to potential cryptographic security control bypass. No public exploit identified at time of analysis.

Authentication Bypass Tls Otp
NVD GitHub VulDB
CVE-2026-31960
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Unbounded memory consumption in Quill's Apple notarization process allows denial of service when HTTP responses lack size validation, affecting environments with TLS-intercepting proxies or compromised certificate authorities where response manipulation is possible. An attacker positioned to intercept or modify notarization API responses can return arbitrarily large payloads to exhaust memory and crash the signing process. This impacts corporate networks and environments with trust boundary violations, though exploitation is not feasible under standard HTTPS conditions with proper certificate validation.

Tls Denial Of Service
NVD GitHub VulDB
CVE-2026-31959
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Quill before v0.7.1 contains a server-side request forgery vulnerability in its Apple notarization log retrieval functionality that fails to validate URL schemes and destination hosts. Exploitation requires an attacker to intercept or modify API responses, making it primarily a threat in environments with TLS-intercepting proxies, compromised certificate authorities, or other trust boundary violations. An attacker could redirect notarization requests to internal or multicast addresses, potentially exposing sensitive information or accessing restricted resources.

Tls SSRF
NVD GitHub VulDB
CVE-2025-67034
EPSS 0% CVSS 8.8
HIGH This Week

An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacker can inject OS commands into the "name" parameter when deleting SSL credentials through the management interface. [CVSS 8.8 HIGH]

Tls Command Injection
NVD VulDB
CVE-2026-3822
EPSS 0% CVSS 6.5
MEDIUM This Month

The Taipower Android application fails to validate TLS/SSL certificates during HTTPS connections, enabling unauthenticated attackers to conduct man-in-the-middle attacks against users. This vulnerability allows adversaries to intercept and modify network traffic without user awareness. No patch is currently available for this medium-severity issue (CVSS 6.5).

Tls Taipower App
NVD
CVE-2026-30852
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Caddy versions 2.7.5 through 2.11.1 contain a template injection vulnerability in the vars_regexp matcher that allows remote attackers to perform double variable expansion on user-controlled input, enabling disclosure of environment variables and file contents. By injecting placeholders like {env.DATABASE_URL} or {file./etc/passwd} into request headers, an unauthenticated attacker can leak sensitive system information. Public exploit code exists for this vulnerability, which is fixed in version 2.11.2.

Tls Caddy
NVD GitHub
CVE-2026-30851
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

Caddy versions 2.10.0 through 2.11.1 fail to strip client-supplied headers in the forward_auth copy_headers directive, enabling authenticated attackers to inject identity headers and escalate privileges. This authentication bypass vulnerability affects deployments relying on Caddy for request forwarding and has public exploit code available. The vulnerability requires valid authentication credentials but allows complete privilege elevation within affected systems.

Tls Privilege Escalation Caddy
NVD GitHub
CVE-2026-27944
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

Unauthenticated backup download and RCE in Nginx UI before 2.3.3. EPSS 1.0%. PoC available.

Nginx Tls Nginx Ui +1
NVD GitHub VulDB
CVE-2026-26999
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Traefik versions before 2.11.38 and 3.6.9 allow remote attackers to cause denial of service by sending incomplete TLS records to TCP routers, which causes the TLS handshake process to hang indefinitely while holding connections open. An unauthenticated attacker can exploit this by opening many stalled connections in parallel to exhaust file descriptors and goroutines, degrading or disabling the proxy service.

Tls Traefik Redhat +1
NVD GitHub
CVE-2025-13476
EPSS 0% CVSS 9.8
CRITICAL Act Now

Static TLS fingerprint in Rakuten Viber Cloak mode enables tracking despite privacy mode.

Windows Android Tls +1
NVD
CVE-2026-20106
EPSS 0% CVSS 5.3
MEDIUM This Month

Unauthenticated remote attackers can trigger memory exhaustion on Cisco ASA and FTD devices by sending specially crafted packets to the SSL VPN service, exploiting insufficient input validation in the Remote Access SSL VPN, HTTP management, and MUS functionality. Successful exploitation causes a denial of service condition that requires manual device reboot. No patch is currently available.

Cisco Tls Denial Of Service
NVD
CVE-2026-20105
EPSS 0% CVSS 7.7
HIGH This Week

Denial of service in Cisco Secure Firewall ASA and FTD Remote Access SSL VPN functionality allows authenticated attackers to exhaust device memory by sending specially crafted packets, forcing a device reload. The vulnerability stems from insufficient input validation on user-supplied data and requires valid VPN credentials to exploit. No patch is currently available.

Cisco Tls Denial Of Service
NVD
CVE-2026-20103
EPSS 0% CVSS 8.6
HIGH This Week

Denial of service in Cisco Secure Firewall ASA and FTD Remote Access SSL VPN allows unauthenticated remote attackers to exhaust device memory through malformed packets, causing the VPN service to become unresponsive. The vulnerability stems from insufficient input validation on the SSL VPN server and currently has no available patch. While the management interface remains accessible, new VPN connections cannot be established during an attack.

Cisco Tls Denial Of Service
NVD
CVE-2026-20100
EPSS 0% CVSS 7.7
HIGH This Week

Cisco Secure Firewall ASA and FTD devices are vulnerable to a denial of service attack through the Remote Access SSL VPN feature, where authenticated attackers can trigger unvalidated input processing in the Lua interpreter to force device reloads. The vulnerability stems from insufficient input validation in the Lua interpreter and can be exploited by sending specially crafted HTTP packets over an existing VPN connection. No patch is currently available for this HIGH severity issue (CVSS 7.7).

Cisco Tls Denial Of Service
NVD
CVE-2026-20052
EPSS 0% CVSS 5.8
MEDIUM This Month

Denial of service in Cisco Secure Firewall Threat Defense via crafted SSL packets allows unauthenticated remote attackers to crash the Snort 3 Detection Engine through a memory management logic error during SSL inspection. An attacker can exploit this vulnerability by sending malicious SSL packets through an established connection, forcing the detection engine to unexpectedly restart and interrupt security monitoring. No patch is currently available for this medium-severity issue.

Cisco Tls Denial Of Service
NVD
CVE-2026-20050
EPSS 0% CVSS 6.8
MEDIUM This Month

Device reloads in Cisco Secure Firewall Threat Defense can be triggered by unauthenticated remote attackers sending specially crafted TLS 1.2 traffic through the SSL decryption feature, exploiting improper memory management in the Do Not Decrypt exclusion logic. The vulnerability requires specific network conditions and TLS 1.2 traffic to trigger, resulting in denial of service with no authentication required. No patch is currently available for this medium-severity issue affecting Cisco and TLS implementations.

Cisco Tls Denial Of Service
NVD
CVE-2026-20006
EPSS 0% CVSS 5.8
MEDIUM This Month

Cisco Secure Firewall Threat Defense (FTD) Software is vulnerable to denial of service through improper TLS protocol implementation in the Snort 3 Detection Engine, allowing unauthenticated remote attackers to trigger unexpected restarts by sending crafted TLS packets. Successful exploitation causes the affected device to drop network traffic, creating a DoS condition affecting TLS versions prior to 1.3. No patch is currently available.

Cisco Tls Denial Of Service
NVD
CVE-2026-20005
EPSS 0% CVSS 5.8
MEDIUM This Month

Snort 3 Detection Engine contains a vulnerability that allows attackers to cause a denial of service (DoS) condition when the Snort 3 Detection Engine rest (CVSS 5.8).

Cisco Tls Denial Of Service
NVD
CVE-2026-24695
EPSS 0% CVSS 8.0
HIGH This Week

Remote code execution in XWEB Pro firmware versions 1.12.1 and earlier allows authenticated attackers to execute arbitrary commands by injecting malicious input into OpenSSL parameter fields. An attacker with valid credentials can exploit this command injection vulnerability through the utility route to gain complete system compromise. No patch is currently available for affected XWEB 500b Pro and 300d Pro devices.

OpenSSL Tls RCE +4
NVD GitHub
CVE-2026-3100
EPSS 0% CVSS 6.5
MEDIUM This Month

Man-in-the-middle attacks in TLS/SSL certificate verification for FTPES/FTPS connections in ADM 4.1.0-4.3.3.ROF1 and 5.0.0-5.1.2.RE51 allow remote attackers to intercept and modify backup data and authentication credentials without patching available. The FTP Backup feature fails to properly validate certificates, enabling network traffic interception and credential compromise during secure file transfers. Affected organizations should implement network segmentation or disable FTPES/FTPS backup functionality until patches become available.

Tls Data Master
NVD
CVE-2026-27590
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

FastCGI path splitting vulnerability in Caddy before 2.11.1 allows request smuggling or path confusion when proxying to FastCGI backends (PHP-FPM). EPSS 0.19% with PoC available.

PHP Tls RCE +2
NVD GitHub
CVE-2026-27589
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Caddy versions prior to 2.11.1 allow unauthenticated cross-origin requests to the admin API when origin enforcement is disabled, enabling attackers to remotely reconfigure the server through malicious web content loaded in a victim's browser. Public exploit code exists for this vulnerability, which can be leveraged to modify HTTP server behavior and admin listener settings without user knowledge. The vulnerability affects Caddy and TLS implementations, with no patch currently available for affected versions.

Tls Caddy Suse
NVD GitHub
CVE-2026-27588
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Host header case sensitivity bypass in Caddy before 2.11.1. Virtual host routing can be bypassed by using alternate casing in the Host header. PoC available.

Tls Caddy Suse
NVD GitHub
CVE-2026-27587
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Case sensitivity bypass in Caddy web server path matching before 2.11.1. HTTP path matchers can be bypassed using alternate casing on case-insensitive filesystems. PoC available.

Tls Caddy Suse
NVD GitHub
CVE-2026-27586
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

TLS error swallowing in Caddy web server before 2.11.1 allows bypassing client certificate authentication. Errors in ClientCAs handling are silenced, potentially accepting invalid client certificates. PoC available.

Tls Caddy Suse
NVD GitHub
CVE-2026-27585
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Caddy versions prior to 2.11.1 fail to sanitize backslashes in file path matching, allowing attackers to bypass path-based security controls through specially crafted requests. The vulnerability affects systems with specific Caddy configurations and has public exploit code available. Exploitation requires network access with no authentication, resulting in limited information disclosure or modification of restricted resources.

Tls Caddy Suse
NVD GitHub
CVE-2025-70058
EPSS 0% CVSS 7.4
HIGH This Week

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in YMFE yapi v1.12.0. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in the HTTPS agent configuration for Axios requests [CVSS 7.4 HIGH]

Tls Yapi
NVD GitHub
CVE-2025-70045
EPSS 0% CVSS 7.4
HIGH This Week

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in jxcore jxm master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTPS request options when 'jx_obj.IsSecure' is true [CVSS 7.4 HIGH]

Tls Jxm
NVD GitHub
CVE-2025-70043
EPSS 0% CVSS 9.1
CRITICAL Act Now

Improper certificate validation in Ayms node-To master Node.js module. The application does not properly validate TLS certificates, enabling man-in-the-middle attacks.

Tls
NVD GitHub
CVE-2026-26994
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

uTLS versions 1.6.7 and below fail to validate TLS 1.3 downgrade protection mechanisms, allowing network attackers to force ClientHello modifications that cause servers to respond with lower TLS versions while bypassing detection checks. An active attacker can exploit this to downgrade encrypted connections to TLS 1.2 or earlier, potentially exposing traffic to known cryptographic weaknesses. Affected users of uTLS, Red Hat, and other TLS implementations should update to patched versions immediately.

Redhat Tls Utls +1
NVD GitHub
CVE-2026-26327
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw's mDNS/Bonjour discovery beacons transmit unauthenticated TXT records that iOS, macOS, and Android clients treat as authoritative for routing and TLS certificate pinning, allowing an attacker on a shared LAN to advertise a rogue service and redirect connections to attacker-controlled endpoints. An attacker can exploit this to bypass TLS pinning validation and potentially capture Gateway credentials through man-in-the-middle attacks. The vulnerability affects OpenClaw versions prior to 2026.2.14 and requires network proximity but no user interaction.

macOS Android iOS +4
NVD GitHub
CVE-2026-27180
EPSS 62% 5.3 CVSS 9.8
CRITICAL POC THREAT Emergency

MajorDoMo home automation platform is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method without authentication due to improper use of gr() (which reads from $_REQUEST), allowing attackers to redirect update URLs and push malicious code packages.

PHP Tls RCE +1
NVD GitHub
CVE-2025-65753
EPSS 0% CVSS 7.5
HIGH This Week

TLS certification mechanism of Guardian Gryphon v01.06.0006.22 is affected by improper certificate validation (CVSS 7.5).

Tls
NVD GitHub
CVE-2026-26214
EPSS 0% CVSS 7.4
HIGH This Week

Galaxy FDS Android SDK version 3.0.8 and earlier disable TLS hostname verification by default, allowing attackers to perform man-in-the-middle attacks against applications using the library. All applications leveraging this SDK with default configuration are vulnerable to interception and modification of communications with Xiaomi FDS cloud storage, potentially compromising authentication credentials and file contents. No patch is currently available, and the affected open source project has reached end-of-life status.

Android Apache Tls
NVD GitHub
CVE-2026-25961
EPSS 0% CVSS 7.5
HIGH POC This Week

SumatraPDF versions 3.5.0 through 3.5.2 fail to validate TLS certificates during software updates and execute installers without signature verification, allowing network attackers to perform man-in-the-middle attacks and inject malicious code. An attacker with any valid TLS certificate can intercept update requests and redirect users to a malicious installer, achieving arbitrary code execution on Windows systems. Public exploit code exists for this vulnerability and no patch is currently available.

Windows Tls Sumatrapdf
NVD GitHub
CVE-2026-25644
EPSS 0% CVSS 7.5
HIGH This Week

DataHub versions prior to 1.3.1.8 are vulnerable to man-in-the-middle attacks during LDAP authentication due to insufficient TLS certificate validation, allowing attackers on the network to intercept and eavesdrop on sensitive authentication credentials. An unauthenticated attacker can downgrade the TLS connection to capture plaintext LDAP credentials without requiring user interaction. No patch is currently available for affected deployments.

Tls Ldap Datahub
NVD GitHub
CVE-2026-25651
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

Client-certificate-auth middleware for Node.js versions 0.2.1 and 0.3.0 fails to validate the Host header when redirecting HTTP requests to HTTPS, enabling attackers to craft malicious redirects that direct users to arbitrary domains. Public exploit code exists for this open redirect vulnerability, and no patch is currently available for affected versions.

Node.js Tls Open Redirect +1
NVD GitHub
CVE-2025-68121
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

Critical certificate validation bypass in Go crypto/tls during session resumption. If ClientCAs or RootCAs fields are mutated between creating the config and resuming a session, the TLS stack uses the modified trust store, potentially accepting certificates from unintended CAs. CVSS 10.0, PoC available, patch available.

Golang Tls Authentication Bypass +3
NVD VulDB
CVE-2025-68723
EPSS 0% CVSS 9.0
CRITICAL Act Now

Multiple stored XSS vulnerabilities in Axigen Mail Server before 10.5.57 WebAdmin interface allow authenticated administrators to inject persistent malicious scripts that execute in other admin sessions.

Tls XSS Privilege Escalation +1
NVD GitHub
CVE-2025-68721
EPSS 0% CVSS 8.1
HIGH This Week

Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access control checks and gain unauthorized access to the SSL Certificates management endpoint (page=sslcerts). [CVSS 8.1 HIGH]

Tls Axigen Mail Server
NVD GitHub
CVE-2026-25160
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Alist file manager has an improper certificate validation vulnerability allowing MITM attacks that could compromise file operations and stored credentials.

Tls Alist Suse
NVD GitHub
CVE-2026-24932
EPSS 0% CVSS 5.9
MEDIUM This Month

Improper TLS/SSL certificate validation in ADM's DDNS update function (versions 4.1.0-4.3.3.ROF1 and 5.0.0-5.1.1.RCI1) enables remote man-in-the-middle attacks to intercept HTTPS communications and extract sensitive data including user email, MD5 hashed passwords, and device serial numbers. An unauthenticated attacker on the network can exploit this weakness without user interaction to compromise DDNS update credentials. No patch is currently available for affected versions.

Tls Data Master
NVD
CVE-2026-25060
EPSS 0% CVSS 8.1
HIGH PATCH This Week

OpenList versions prior to 4.1.10 disable TLS certificate verification by default in storage driver communications, enabling man-in-the-middle attacks where network-positioned attackers can intercept, decrypt, and manipulate all data exchanges with storage backends. This misconfiguration affects any deployment relying on OpenList Frontend's default settings and can be exploited via ARP spoofing, rogue access points, or compromised network infrastructure to redirect traffic to attacker-controlled servers. A patch is available in version 4.1.10 and later.

Tls Openlist Suse
NVD GitHub
CVE-2026-1778
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Amazon SageMaker Python SDK versions prior to v2.256.0 or v3.1.1 disable TLS certificate verification when importing Triton Python models, enabling attackers to perform man-in-the-middle attacks by presenting invalid or self-signed certificates. This vulnerability affects organizations using the affected SDK versions for model imports over HTTPS connections. No patch is currently available for this vulnerability.

Python Tls AI / ML
NVD GitHub
CVE-2025-61730
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. [CVSS 5.3 MEDIUM]

Tls Information Disclosure Go +1
NVD VulDB
CVE-2022-40620
EPSS 0% CVSS 7.7
HIGH POC This Week

FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism. [CVSS 7.7 HIGH]

Netgear Tls R6230 Firmware +9
NVD
CVE-2026-22796
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

OpenSSL's PKCS#7 signature verification fails to validate ASN1_TYPE union members before access, allowing attackers to trigger null pointer dereference crashes by submitting malformed PKCS#7 data. Applications performing signature verification or using PKCS7_digest_from_attributes() directly are vulnerable to denial of service attacks. A patch is available to address this type confusion vulnerability.

OpenSSL Tls Null Pointer Dereference +3
NVD GitHub VulDB
CVE-2026-22795
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Processing a malformed PKCS#12 file in OpenSSL and related TLS libraries can trigger a null pointer dereference due to improper type validation in ASN.1 parsing, causing applications to crash. This vulnerability requires local user interaction to exploit and results only in denial of service, with no impact on data confidentiality or integrity. A patch is available to address this medium-severity issue.

OpenSSL Tls Null Pointer Dereference +3
NVD GitHub VulDB
CVE-2025-69421
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. [CVSS 7.5 HIGH]

OpenSSL Tls Null Pointer Dereference +3
NVD GitHub VulDB
CVE-2025-69420
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. [CVSS 7.5 HIGH]

OpenSSL Tls Null Pointer Dereference +3
NVD GitHub VulDB
CVE-2025-69419
EPSS 0% CVSS 7.4
HIGH PATCH This Week

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. [CVSS 7.4 HIGH]

OpenSSL Tls Memory Corruption +3
NVD GitHub VulDB
CVE-2025-69418
EPSS 0% CVSS 4.0
MEDIUM PATCH This Month

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. [CVSS 4.0 MEDIUM]

OpenSSL Tls Redhat +1
NVD GitHub VulDB
CVE-2025-68160
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. [CVSS 4.7 MEDIUM]

OpenSSL Tls Heap Overflow +4
NVD GitHub VulDB
CVE-2025-66199
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. [CVSS 5.9 MEDIUM]

OpenSSL Tls Memory Corruption +4
NVD GitHub VulDB
CVE-2025-15469
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. [CVSS 5.5 MEDIUM]

OpenSSL Tls Redhat +1
NVD GitHub VulDB
CVE-2025-15468
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. [CVSS 5.9 MEDIUM]

OpenSSL Tls Null Pointer Dereference +3
NVD GitHub VulDB
CVE-2025-15467
EPSS 1% CVSS 9.8
CRITICAL PATCH Act Now

OpenSSL has a critical out-of-bounds write when parsing CMS AuthEnvelopedData/EnvelopedData with malicious AEAD parameters, enabling potential RCE.

OpenSSL Tls RCE +5
NVD GitHub VulDB
CVE-2025-32057
EPSS 0% CVSS 6.5
MEDIUM This Month

The Infotainment ECU manufactured by Bosch which is installed in Nissan Leaf ZE1 - 2020 uses a Redbend service for over-the-air provisioning and updates. HTTPS is used for communication with the back-end server. [CVSS 6.5 MEDIUM]

Tls
NVD
CVE-2025-68133
EPSS 0% CVSS 7.4
HIGH POC PATCH This Week

EVerest is an EV charging software stack. In versions 2025.9.0 and below, an attacker can exhaust the operating system's memory and cause the module to terminate by initiating an unlimited number of TCP connections that never proceed to ISO 15118-2 communication. [CVSS 7.4 HIGH]

Tls Everest
NVD GitHub
CVE-2026-21926
EPSS 0% CVSS 7.5
HIGH This Week

Siebel Customer Relationship Management Deployment contains a vulnerability that allows attackers to unauthorized ability to cause a hang or frequently repeatable crash (complete DO (CVSS 7.5).

Oracle Tls Denial Of Service +1
NVD
CVE-2026-21637
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Node.js TLS servers using PSK or ALPN callbacks are vulnerable to denial of service when these callbacks throw unhandled synchronous exceptions during the TLS handshake. Remote attackers can exploit this by sending specially crafted TLS handshake requests to trigger resource exhaustion or process crashes, either through immediate termination or silent file descriptor leaks. No patch is currently available for this vulnerability.

Node.js Tls Denial Of Service +3
NVD
CVE-2025-59464
EPSS 0% CVSS 7.5
HIGH PATCH This Week

A memory leak in Node.js’s OpenSSL integration occurs when converting `X.509` certificate fields to UTF-8 without freeing the allocated buffer. [CVSS 7.5 HIGH]

Node.js OpenSSL Tls +4
NVD
CVE-2025-11043
EPSS 0% CVSS 7.4
HIGH This Week

An Improper Certificate Validation vulnerability in the OPC-UA client and ANSL over TLS client used in Automation Studio versions up to 6.5 is affected by improper certificate validation (CVSS 7.4).

Tls
NVD
CVE-2026-22045
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Denial of service in Traefik versions prior to 2.11.35 and 3.6.7 allows unauthenticated remote attackers to exhaust server resources by establishing incomplete ACME TLS-ALPN connections and leaving them open indefinitely. An attacker can send minimal ClientHello messages with the acme-tls/1 protocol and cease responding, causing goroutines and file descriptors to be held until the entry point becomes unavailable. The vulnerability affects systems with ACME TLS challenge enabled.

Golang Tls Denial Of Service +3
NVD GitHub
CVE-2026-21917
EPSS 0% CVSS 7.5
HIGH This Week

Malformed SSL packets can trigger a Denial-of-Service condition in Juniper SRX devices running Junos OS with UTM Web-Filtering enabled, causing Forwarding Processor Card (FPC) crashes and restarts without requiring authentication. An unauthenticated network-based attacker can exploit this input validation flaw in the Web-Filtering module to disrupt device availability across affected Junos versions (23.2R2-S2 through 24.4R2). No patches are currently available for earlier Junos versions, and affected systems remain vulnerable until updates are applied.

Juniper Tls Denial Of Service +1
NVD
CVE-2026-21907
EPSS 0% CVSS 5.9
MEDIUM This Month

Junos Space versions up to 24.1 is affected by use of a broken or risky cryptographic algorithm (CVSS 5.9).

Juniper Tls Junos Space
NVD
CVE-2026-22771
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Credential theft via Lua script execution in Envoy Gateway versions before 1.5.7 and 1.6.2 allows authenticated attackers to extract proxy credentials and subsequently access the control plane and all associated secrets including TLS private keys. Public exploit code exists for this vulnerability. Affected organizations running vulnerable Envoy Gateway instances should immediately upgrade as no patch is currently available for intermediate versions.

Kubernetes Tls Gateway +2
NVD GitHub
CVE-2026-22250
EPSS 0% CVSS 2.5
LOW PATCH Monitor

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, the SSL verification would be skipped for some crafted URLs. [CVSS 2.5 LOW]

Tls
NVD GitHub
CVE-2025-71063
EPSS 0% CVSS 8.2
HIGH PATCH This Week

Errands before 46.2.10 does not verify TLS certificates for CalDAV servers. [CVSS 8.2 HIGH]

Tls Errands
NVD GitHub
CVE-2025-66001
EPSS 0% CVSS 8.8
HIGH PATCH This Week

NeuVector supports login authentication through OpenID Connect. However, the TLS verification (which verifies the remote server's authenticity and integrity) for OpenID Connect is not enforced by default. [CVSS 8.8 HIGH]

Tls Suse
NVD GitHub
CVE-2025-14819
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. [CVSS 5.3 MEDIUM]

Tls Curl Suse
NVD
CVE-2025-14017
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. [CVSS 6.3 MEDIUM]

Tls Ldap Curl +2
NVD
CVE-2025-15346
EPSS 0%
PATCH This Week

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.

Python Tls
NVD GitHub
CVE-2025-68637
EPSS 0% CVSS 9.1
CRITICAL Act Now

Uniffle HTTP client (before 0.10.0) trusts all SSL certificates and disables hostname verification by default, exposing all REST API communication between the CLI and Coordinator to man-in-the-middle attacks.

Tls Uniffle
NVD
CVE-2026-21444
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

Improper IV handling in libtpms 0.10.0 and 0.10.1 causes the library to return initial instead of final initialization vectors during symmetric cipher operations with OpenSSL 3.x, potentially weakening cryptographic security for local users who can interact with the TPM emulation. Public exploit code exists for this vulnerability affecting confidentiality of encrypted data. Update to libtpms 0.10.2 to remediate.

OpenSSL Tls Libtpms +2
NVD GitHub
CVE-2025-69412
EPSS 0% CVSS 3.4
LOW Monitor

KDE messagelib before 25.11.90 ignores SSL errors for threatMatches:find in the Google Safe Browsing Lookup API (aka phishing API), which might allow spoofing of threat data. NOTE: this Lookup API is not contacted in the messagelib default configuration. [CVSS 3.4 LOW]

Tls
NVD GitHub
CVE-2025-39682
EPSS 0% CVSS 7.1
HIGH PATCH This Week

This vulnerability in the Linux kernel's TLS receive path allows a local attacker with low privileges to cause a denial of service or potentially leak sensitive information in memory. The flaw occurs when handling zero-length TLS records on the rx_list, where the kernel fails to properly handle the corner case of zero-length initial records during zero-copy decryption operations. With an EPSS score of only 0.01% (1st percentile), active exploitation is highly unlikely despite the 7.1 CVSS score, and patches are available from the vendor.

Linux Tls Denial Of Service +4
NVD
CVE-2025-49812
EPSS 0% CVSS 7.4
HIGH PATCH This Week

CVE-2025-49812 is an HTTP request smuggling/desynchronization vulnerability in Apache HTTP Server's mod_ssl that allows man-in-the-middle attackers to hijack HTTPS sessions by exploiting improper handling of TLS upgrades. Only Apache HTTP Server versions through 2.4.63 with 'SSLEngine optional' configurations are affected, enabling session hijacking with high confidentiality and integrity impact. The vulnerability requires network-level access and careful timing but does not require user interaction or privileges; upgrade to 2.4.64 (which removes TLS upgrade support entirely) is the recommended mitigation.

Apache Tls Session Fixation +3
NVD
CVE-2025-23048
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

CVE-2025-23048 is an authentication bypass vulnerability in Apache HTTP Server 2.4.35-2.4.63 affecting mod_ssl configurations with multiple virtual hosts using different client certificate restrictions. An attacker with valid client certificates trusted by one virtual host can exploit TLS 1.3 session resumption to access another restricted virtual host if SSLStrictSNIVHostCheck is not enabled, achieving unauthorized access to confidential information and potentially modifying data. This is a network-accessible vulnerability with no authentication required and high real-world impact.

Apache Authentication Bypass Tls +3
NVD
CVE-2024-47252
EPSS 0% CVSS 7.5
HIGH PATCH This Week

CVE-2024-47252 is a security vulnerability (CVSS 7.5). High severity vulnerability requiring prompt remediation.

Apache Information Disclosure Tls +3
NVD
CVE-2025-6433
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

CVE-2025-6433 is a critical WebAuthn specification violation in Firefox and Thunderbird that allows attackers to present WebAuthn authentication challenges over non-secure TLS connections with user-granted exceptions. This bypasses the WebAuthn requirement for secure transport without errors, enabling credential theft and account compromise. Firefox < 140 and Thunderbird < 140 are affected; the network-based attack requires no privileges or user interaction beyond the initial certificate exception grant, resulting in a CVSS 9.8 critical rating.

Mozilla Authentication Bypass Tls +4
NVD
CVE-2025-41361
EPSS 0% CVSS 8.3
HIGH This Week

A remote code execution vulnerability in IDF (CVSS 8.3). High severity vulnerability requiring prompt remediation.

Denial Of Service Tls IoT
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy