#VU124802 Improper Authentication in mbed TLS - CVE-2026-34873
Published: April 2, 2026
mbed TLS
ARM
Description
The vulnerability allows a remote attacker to impersonate a legitimate client during TLS session resumption.
The vulnerability exists due to improper session validation in the TLS 1.3 session resumption mechanism when handling a downgrade from TLS 1.3 to TLS 1.2 after a HelloRetryRequest. A remote attacker can intercept the HelloRetryRequest and send a specially crafted ClientHello that negotiates TLS 1.2 to impersonate a legitimate client and bypass authentication mechanisms.
The server incorrectly proceeds to resume a TLS 1.2 session using an all-zero master secret, potentially allowing the attacker to inherit application-level privileges if session tickets encode authorization data.