CVE-2020-36478 — Improper Certificate Validation in ARM Mbed TLS
Severity
7.5HIGHNVD
EPSS
0.5%
top 33.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 23
Latest updateMay 24
Description
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages4 packages
Also affects: Debian Linux 10.0, 9.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3Microsoft▶
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certific↗2021-08-10
Debian▶
CVE-2020-36478: mbedtls - An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and bef...↗2020