#VU124809 Improper access control in mbed TLS - CVE-2026-25834

 

#VU124809 Improper access control in mbed TLS - CVE-2026-25834

Published: April 2, 2026


Vulnerability identifier: #VU124809
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-25834
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
mbed TLS
Software vendor:
ARM

Description

The vulnerability allows a remote attacker to bypass security policies.

The vulnerability exists due to improper access control in the TLS 1.2 signature algorithm negotiation component when processing server responses during handshake. A remote attacker can send a specially crafted server response to cause the client to accept a signature algorithm not previously advertised in the client hello, leading to a security policy bypass.

The issue affects only TLS 1.2 connections and occurs when the server ignores the signature algorithms extension sent by the client. The client fails to enforce the configured policy via mbedtls_ssl_conf_sig_algs().


Remediation

Install security update from vendor's website.

External links