CVE-2026-34872Improper Verification of Cryptographic Signature in ARM Mbed TLS

Severity
9.1CRITICALNVD
EPSS
0.0%
top 96.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1
Latest updateApr 2

Description

An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Crypto 1.0. There is a lack of contributory behavior in FFDH due to improper input validation. Using finite-field Diffie-Hellman, the other party can force the shared secret into a small set of values (lack of contributory behavior). This is a problem for protocols that depend on contributory behavior (which is not the case for TLS). The attack can be carried by the peer, or depending on the protocol by an active networ

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

Affected Packages2 packages

NVDarm/mbed_tls< 3.6.6

🔴Vulnerability Details

3
OSV
CVE-2026-34872: An issue was discovered in Mbed TLS 32026-04-01
GHSA
GHSA-347r-37hj-5jc9: An issue was discovered in Mbed TLS 32026-04-01
CVEList
CVE-2026-34872: An issue was discovered in Mbed TLS 32026-04-01

📋Vendor Advisories

2
Red Hat
mbedtls: Mbed TLS and TF-PSA-Crypto: Shared secret manipulation via improper FFDH input validation2026-04-01
Debian
CVE-2026-34872: mbedtls - An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Cry...2026

🕵️Threat Intelligence

11
Wiz
CVE-2026-34873 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-34871 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-25835 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-34876 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-25833 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-34872 micropython: Mbed TLS and TF-PSA-Crypto: Shared secret manipulation via improper FFDH input validation [fedora-all]2026-04-02
CVE-2026-34872 — ARM Mbed TLS vulnerability | cvebase