Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27017: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in refraction-networking utls

0
Low
VulnerabilityCVE-2026-27017cvecve-2026-27017cwe-1240
Published: Fri Feb 20 2026 (02/20/2026, 02:47:17 UTC)
Source: CVE Database V5
Vendor/Project: refraction-networking
Product: utls

Description

uTLS is a fork of crypto/tls, created to customize ClientHello for fingerprinting resistance while still using it for the handshake. Versions 1.6.0 through 1.8.0 contain a fingerprint mismatch with Chrome when using GREASE ECH, related to cipher suite selection. When Chrome selects the preferred cipher suite in the outer ClientHello and for ECH, it does so consistently based on hardware support—for example, if it prefers AES for the outer cipher suite, it also uses AES for ECH. However, the Chrome parrot in uTLS hardcodes AES preference for outer cipher suites but selects the ECH cipher suite randomly between AES and ChaCha20. This creates a 50% chance of selecting ChaCha20 for ECH while using AES for the outer cipher suite, a combination impossible in Chrome. This issue only affects GREASE ECH; in real ECH, Chrome selects the first valid cipher suite when AES is preferred, which uTLS handles correctly. This issue has been fixed in version 1.8.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:51:57 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27017 affects the uTLS library, a fork of Go's crypto/tls designed to customize the TLS ClientHello message for fingerprinting resistance. The flaw exists in versions 1.6.0 through 1.8.0 and involves the handling of GREASE ECH (Encrypted ClientHello) cipher suite selection. Chrome consistently selects cipher suites based on hardware preferences, ensuring the outer ClientHello and ECH extensions use matching cipher suites (e.g., both AES or both ChaCha20). However, uTLS's implementation hardcodes AES preference for the outer ClientHello but randomly chooses between AES and ChaCha20 for the ECH cipher suite, resulting in a 50% chance of mismatched cipher suites. This mismatch creates a fingerprinting anomaly that can be detected by network observers, potentially undermining the fingerprinting resistance goals of uTLS. Importantly, this issue only affects GREASE ECH, a mechanism used for testing and obfuscation, and not real ECH, where uTLS correctly aligns cipher suite selection with Chrome's behavior. The vulnerability does not compromise cryptographic security directly but may leak subtle fingerprinting information. The issue was addressed in uTLS version 1.8.1 by aligning cipher suite selection logic. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges required, user interaction needed, and low confidentiality impact, resulting in a low overall score of 2.3.

Potential Impact

The primary impact of this vulnerability is a reduction in the effectiveness of fingerprinting resistance mechanisms in applications using vulnerable uTLS versions. Attackers capable of passively monitoring TLS handshakes could detect the inconsistent cipher suite combinations unique to uTLS GREASE ECH usage, potentially identifying or distinguishing clients using this library. However, since this does not affect real ECH usage or the cryptographic security of the handshake, it does not lead to direct data compromise, man-in-the-middle attacks, or denial of service. The vulnerability's low severity and lack of known exploits limit its immediate risk. Nonetheless, organizations relying on uTLS for enhanced privacy and fingerprinting resistance may experience degraded anonymity guarantees until patched. This could be relevant for privacy-focused applications, censorship circumvention tools, or environments where TLS fingerprinting evasion is critical.

Mitigation Recommendations

Organizations and developers using uTLS should upgrade to version 1.8.1 or later, where the cipher suite selection logic for GREASE ECH has been corrected to match Chrome's behavior. For those unable to upgrade immediately, a temporary mitigation is to disable GREASE ECH usage in uTLS configurations, as the vulnerability only affects this mode. Additionally, thorough testing should be conducted to ensure that TLS handshake fingerprinting aligns with expected patterns to avoid unintended information leakage. Monitoring network traffic for anomalous TLS ClientHello fingerprints can help detect vulnerable clients. Developers should also review their TLS customization code to ensure consistent cipher suite selection across all handshake extensions. Finally, maintain awareness of updates from refraction-networking and related projects to promptly apply security patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T03:08:23.490Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6997d231d7880ec89b52f4e7

Added to database: 2/20/2026, 3:17:05 AM

Last enriched: 2/28/2026, 2:51:57 PM

Last updated: 4/4/2026, 1:57:40 PM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses