CVE-2026-34877 — Execution with Unnecessary Privileges in ARM Mbed TLS
Severity
9.8CRITICALNVD
EPSS
0.1%
top 64.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateApr 3
Description
An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, leading to arbitrary code execution. This is caused by Incorrect Use of Privileged APIs.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
4📋Vendor Advisories
1Debian▶
CVE-2026-34877: mbedtls - An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4...↗2026
🕵️Threat Intelligence
11💬Community
1Bugzilla▶
CVE-2026-34877 micropython: Risk of insufficient protection of serialized session or context data leading to potential memory safety issues [fedora-all]↗2026-04-02