Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30166: n/a

0
Critical
VulnerabilityCVE-2024-30166cvecve-2024-30166
Published: Wed Apr 03 2024 (04/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Mbed TLS 3.3.0 through 3.5.2 before 3.6.0, a malicious client can cause information disclosure or a denial of service because of a stack buffer over-read (of less than 256 bytes) in a TLS 1.3 server via a TLS 3.1 ClientHello.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:40:59 UTC

Technical Analysis

CVE-2024-30166 is a critical security vulnerability identified in Mbed TLS versions 3.3.0 through 3.5.2 prior to 3.6.0. The issue arises from a stack buffer over-read vulnerability triggered by a malicious client sending a specially crafted TLS 3.1 ClientHello message to a TLS 1.3 server. The flaw allows the attacker to read up to 256 bytes beyond the intended buffer boundary on the stack, potentially disclosing sensitive information from the server's memory. Additionally, this vulnerability can cause a denial of service by crashing the server process due to memory access violations. The root cause is improper validation and handling of the ClientHello message during the TLS handshake, which is a critical phase establishing secure communication. The vulnerability is categorized under CWE-121, indicating a classic stack-based buffer overflow issue. Exploitation requires no privileges or user interaction and can be performed remotely over the network, making it highly accessible to attackers. The CVSS v3.1 base score of 9.1 reflects the high impact on confidentiality and availability, with low attack complexity and no authentication needed. While no active exploits have been reported, the widespread use of Mbed TLS in embedded systems, IoT devices, and various networked applications increases the potential attack surface. The vulnerability affects any organization deploying vulnerable Mbed TLS versions as TLS 1.3 servers, including web services, embedded devices, and network appliances. Immediate remediation involves upgrading to Mbed TLS 3.6.0 or later, where the issue has been fixed. In the absence of patches, network-level mitigations such as filtering malformed TLS ClientHello messages or deploying Web Application Firewalls with TLS protocol anomaly detection may reduce risk. Comprehensive monitoring for unusual TLS handshake failures can also aid early detection of exploitation attempts.

Potential Impact

The vulnerability poses a significant risk to organizations worldwide by enabling attackers to remotely extract sensitive memory contents from TLS 1.3 servers using vulnerable Mbed TLS versions. This information disclosure can lead to leakage of cryptographic material, session keys, or other confidential data, undermining the confidentiality of secure communications. Furthermore, the denial of service aspect can disrupt critical services by crashing servers, impacting availability and potentially causing operational downtime. Given Mbed TLS's extensive use in embedded systems, IoT devices, and network infrastructure, the scope of affected systems is broad, including industrial control systems, telecommunications equipment, and consumer devices. Exploitation requires no authentication or user interaction, increasing the likelihood of automated attacks and scanning. The combined impact on confidentiality and availability, coupled with ease of exploitation, makes this vulnerability a critical threat to organizations relying on affected TLS implementations for secure communications. Failure to address this issue could result in data breaches, service outages, and erosion of trust in affected services.

Mitigation Recommendations

1. Upgrade all affected Mbed TLS instances to version 3.6.0 or later, where the vulnerability is patched. 2. For environments where immediate upgrade is not feasible, implement network-level filtering to block malformed TLS ClientHello messages, particularly those mimicking TLS 3.1 versions, using intrusion prevention systems or firewalls with deep packet inspection capabilities. 3. Deploy Web Application Firewalls (WAFs) or TLS proxies capable of detecting and rejecting anomalous TLS handshake messages. 4. Monitor server logs and network traffic for unusual TLS handshake failures or crashes that may indicate exploitation attempts. 5. Conduct thorough testing of TLS 1.3 server implementations to ensure they correctly handle ClientHello messages and do not exhibit buffer over-read behavior. 6. Educate development and security teams about the risks of improper TLS message parsing and the importance of timely patching. 7. Review and harden embedded and IoT device firmware that uses Mbed TLS to ensure they are updated or mitigated against this vulnerability. 8. Consider implementing rate limiting on TLS handshake attempts to reduce the risk of denial of service attacks exploiting this flaw.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dbcb7ef31ef0b58d625

Added to database: 2/25/2026, 9:46:36 PM

Last enriched: 2/26/2026, 3:40:59 PM

Last updated: 4/12/2026, 3:42:44 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses