Potential authentication bypass in TLS handshake
Title |
Potential authentication bypass in TLS handshake |
---|---|
CVE |
CVE-2025-27810 |
Date |
24 March 2025 |
Affects |
All versions of Mbed TLS |
Severity |
MEDIUM |
Vulnerability
During the TLS handshake, the Finished message ensures that the handshake has not been tampered with by an active attacker. If a memory allocation fails or a cryptographic hardware driver returns an error at a specific point during the handshake, the Finished message will be incorrectly calculated to be the contents of uninitialized stack memory.
Impact
An attacker with the ability to trigger memory allocation failures or cryptographic hardware failures may be able to exploit this to break the security guarantees of the TLS handshake. This may mean that they are able to tamper with the handshake through a Man in the Middle attack or replay handshake messages to impersonate a legitimate peer.
Affected versions
All versions of Mbed TLS up to 2.28.9 and all versions of Mbed TLS 3.x up to 3.6.2 are affected.
Resolution
Affected users should upgrade to Mbed TLS 3.6.3 or Mbed TLS 2.28.10
Work-around
Ensure that enough memory is available before performing a handshake and that any cryptographic hardware drivers used for hash functions cannot return errors.