ghsa-48jg-h3cv-mqvx
Vulnerability from github
Published
2022-05-24 19:11
Modified
2022-05-24 19:11
Details
In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange.
{ "affected": [], "aliases": [ "CVE-2021-34433" ], "database_specific": { "cwe_ids": [ "CWE-347" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-08-20T17:15:00Z", "severity": "HIGH" }, "details": "In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side\u0027s signature on the client side, if that signature is not included in the server\u0027s ServerKeyExchange.", "id": "GHSA-48jg-h3cv-mqvx", "modified": "2022-05-24T19:11:49Z", "published": "2022-05-24T19:11:49Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34433" }, { "type": "WEB", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=575281" } ], "schema_version": "1.4.0", "severity": [] }
Loading...