Mbed Mbedtls vulnerabilities

52 known vulnerabilities affecting mbed/mbedtls.

Total CVEs
52
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL10HIGH14MEDIUM26LOW2

Vulnerabilities

Page 1 of 3
CVE-2021-44732CRITICALCVSS 9.8≥ 0, < 2.8.0-1ubuntu0.1~esm1≥ 0, < 2.16.4-1ubuntu2+esm1+2 more2026-03-25
CVE-2021-44732 [CRITICAL] mbedtls vulnerabilities mbedtls vulnerabilities It was discovered that Mbed TLS incorrectly handled memory allocation failures. A remote attacker could possibly use this issue to crash the program. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-44732) Jonathan Winzig discovered that Mbed TLS incorrectly handled crafted inputs. A remote attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue o
osv
CVE-2025-59438MEDIUMCVSS 5.3≥ 0, < 3.6.5-0.1~deb13u1≥ 0, < 3.6.5-0.12025-10-21
CVE-2025-59438 [MEDIUM] CVE-2025-59438: Mbed TLS through 3 Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.
osv
CVE-2025-54764MEDIUMCVSS 6.2≥ 0, < 3.6.5-0.1~deb13u1≥ 0, < 3.6.5-0.12025-10-20
CVE-2025-54764 [MEDIUM] CVE-2025-54764: Mbed TLS before 3 Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.
osv
CVE-2025-47917CRITICALCVSS 9.8PoCfixed in 3.6.42025-07-20
CVE-2025-47917 [CRITICAL] CWE-416 CVE-2025-47917: Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are develop Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function d
cvelistv5nvdosv
CVE-2025-48965HIGHCVSS 7.5fixed in 3.6.42025-07-20
CVE-2025-48965 [HIGH] CWE-696 CVE-2025-48965: Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigg Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.
cvelistv5nvdosv
CVE-2025-49087LOWCVSS 3.7≥ 3.6.1, < 3.6.42025-07-20
CVE-2025-49087 [LOW] CWE-385 CVE-2025-49087: In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal a In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.
cvelistv5nvdosv
CVE-2025-52496HIGHCVSS 7.8fixed in 3.6.42025-07-04
CVE-2025-52496 [HIGH] CWE-733 CVE-2025-52496: Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occu Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.
cvelistv5nvdosv
CVE-2025-49601MEDIUMCVSS 6.5≥ 3.3.0, < 3.6.42025-07-04
CVE-2025-49601 [MEDIUM] CWE-125 CVE-2025-49601: In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-
cvelistv5nvdosv
CVE-2025-52497MEDIUMCVSS 4.8fixed in 3.6.42025-07-04
CVE-2025-52497 [MEDIUM] CWE-193 CVE-2025-52497: Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_bu Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.
cvelistv5nvdosv
CVE-2025-49600MEDIUMCVSS 4.9≥ 3.3.0, < 3.6.42025-07-04
CVE-2025-49600 [MEDIUM] CWE-325 CVE-2025-49600: In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can induce a hardware hash accelerator fault) to bypass LMS
cvelistv5nvdosv
CVE-2025-27810MEDIUMCVSS 4.8fixed in 2.28.10≥ 3.0.0, < 3.6.32025-03-25
CVE-2025-27810 [MEDIUM] CWE-908 CVE-2025-27810: Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
cvelistv5nvdosv
CVE-2025-27809MEDIUMCVSS 5.4fixed in 2.28.10≥ 3.0.0, < 3.6.32025-03-25
CVE-2025-27809 [MEDIUM] CWE-1188 CVE-2025-27809: Mbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted Mbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted certificates for arbitrary hostnames unless the TLS client application calls mbedtls_ssl_set_hostname.
cvelistv5nvdosv
CVE-2024-49195CRITICALCVSS 9.8≥ 0, < 3.6.2-12024-10-15
CVE-2024-49195 [CRITICAL] CVE-2024-49195: Mbed TLS 3 Mbed TLS 3.5.x through 3.6.x before 3.6.2 has a buffer underrun in pkwrite when writing an opaque key pair
osv
CVE-2024-45159CRITICALCVSS 9.8≥ 0, < 3.6.1-r02024-09-05
CVE-2024-45159 [CRITICAL] CVE-2024-45159: An issue was discovered in Mbed TLS 3 An issue was discovered in Mbed TLS 3.x before 3.6.1. With TLS 1.3, when a server enables optional authentication of the client, if the client-provided certificate does not have appropriate values in if keyUsage or extKeyUsage extensions, then the return value of mbedtls_ssl_get_verify_result() would incorrectly have the MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_KEY_USAGE bits clear. As a result, an att
osv
CVE-2024-45158CRITICALCVSS 9.8≥ 0, < 3.6.1-r02024-09-05
CVE-2024-45158 [CRITICAL] CVE-2024-45158: An issue was discovered in Mbed TLS 3 An issue was discovered in Mbed TLS 3.6 before 3.6.1. A stack buffer overflow in mbedtls_ecdsa_der_to_raw() and mbedtls_ecdsa_raw_to_der() can occur when the bits parameter is larger than the largest supported curve. In some configurations with PSA disabled, all values of bits are affected. (This never happens in internal library calls, but can affect applications that call these functions directly.)
osv
CVE-2024-28755MEDIUMCVSS 6.5≥ 0, < 3.6.0-32024-04-03
CVE-2024-28755 [MEDIUM] CVE-2024-28755: An issue was discovered in Mbed TLS 3 An issue was discovered in Mbed TLS 3.5.x before 3.6.0. When an SSL context was reset with the mbedtls_ssl_session_reset() API, the maximum TLS version to be negotiated was not restored to the configured one. An attacker was able to prevent an Mbed TLS server from establishing any TLS 1.3 connection, potentially resulting in a Denial of Service or forced version downgrade from TLS 1.3 to TLS 1.2.
osv
CVE-2024-28960HIGHCVSS 8.2≥ 0, < 2.28.8-12024-03-29
CVE-2024-28960 [HIGH] CVE-2024-28960: An issue was discovered in Mbed TLS 2 An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory.
osv
CVE-2024-23775HIGHCVSS 7.5≥ 0, < 2.28.7-12024-01-31
CVE-2024-23775 [HIGH] CVE-2024-23775: Integer Overflow vulnerability in Mbed TLS 2 Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2, allows attackers to cause a denial of service (DoS) via mbedtls_x509_set_extension().
osv
CVE-2024-23170MEDIUMCVSS 5.5≥ 0, < 2.28.7-12024-01-31
CVE-2024-23170 [MEDIUM] CVE-2024-23170: An issue was discovered in Mbed TLS 2 An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
osv
CVE-2021-36647MEDIUMCVSS 4.7≥ 0, < 2.16.9-0.1+deb11u1≥ 0, < 2.16.11-0.12023-01-17
CVE-2021-36647 [MEDIUM] CVE-2021-36647: Use of a Broken or Risky Cryptographic Algorithm in the function mbedtls_mpi_exp_mod() in lignum Use of a Broken or Risky Cryptographic Algorithm in the function mbedtls_mpi_exp_mod() in lignum.c in Mbed TLS Mbed TLS all versions before 3.0.0, 2.27.0 or 2.16.11 allows attackers with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) to
osv