CVE-2026-34875Classic Buffer Overflow in ARM Mbed TLS

Severity
9.8CRITICALNVD
EPSS
0.1%
top 83.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1
Latest updateApr 2

Description

An issue was discovered in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0. A buffer overflow can occur in public key export for FFDH keys.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDarm/mbed_tls3.5.03.6.6
NVDarm/tf-psa-crypto< 1.1.0

🔴Vulnerability Details

4
OSV
CVE-2026-34875: (An issue was discovered in Mbed TLS through 32026-04-02
OSV
CVE-2026-34875: An issue was discovered in Mbed TLS through 32026-04-01
CVEList
CVE-2026-34875: An issue was discovered in Mbed TLS through 32026-04-01
GHSA
GHSA-g3pc-q77x-rjjp: An issue was discovered in Mbed TLS through 32026-04-01

📋Vendor Advisories

2
Red Hat
mbedtls: Mbed TLS and TF-PSA-Crypto: Arbitrary code execution due to buffer overflow in FFDH key export2026-04-01
Debian
CVE-2026-34875: mbedtls - An issue was discovered in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0. A buf...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-34875 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-34875 micropython: Mbed TLS and TF-PSA-Crypto: Arbitrary code execution due to buffer overflow in FFDH key export [fedora-all]2026-04-02
CVE-2026-34875 — Classic Buffer Overflow in ARM | cvebase