Description
An issue was discovered in Mbed TLS 3.5.0 through 4.0.0. Client impersonation can occur while resuming a TLS 1.3 session.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: None
Affected Packages1 packages
🔴Vulnerability Details
3OSVCVE-2026-34873: An issue was discovered in Mbed TLS 3↗2026-04-01 ▶ GHSAGHSA-q24g-gcpv-7264: An issue was discovered in Mbed TLS 3↗2026-04-01 ▶ CVEListCVE-2026-34873: An issue was discovered in Mbed TLS 3↗2026-04-01 ▶ 📋Vendor Advisories
2Red Hatmbedtls: Mbed TLS: Client impersonation during TLS 1.3 session resumption↗2026-04-01 ▶ DebianCVE-2026-34873: mbedtls - An issue was discovered in Mbed TLS 3.5.0 through 4.0.0. Client impersonation ca...↗2026 ▶ 🕵️Threat Intelligence
11WizCVE-2026-34873 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶ WizCVE-2026-34871 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶ WizCVE-2026-25835 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶ WizCVE-2026-34876 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶ WizCVE-2026-25833 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶ 💬Community
2BugzillaCVE-2026-34873 micropython: Mbed TLS: Client impersonation during TLS 1.3 session resumption [fedora-all]↗2026-04-02 ▶ BugzillaCVE-2026-34873 mbedtls: Mbed TLS: Client impersonation during TLS 1.3 session resumption [fedora-all]↗2026-04-02 ▶