Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32884: CWE-295: Improper Certificate Validation in randombit botan

0
Medium
VulnerabilityCVE-2026-32884cvecve-2026-32884cwe-295
Published: Mon Mar 30 2026 (03/30/2026, 20:36:19 UTC)
Source: CVE Database V5
Vendor/Project: randombit
Product: botan

Description

CVE-2026-32884 is a medium severity vulnerability in the Botan C++ cryptography library prior to version 3. 11. 0. It involves improper certificate validation related to X. 509 name constraints and case-sensitive comparisons of Common Names (CN) in certificates lacking Subject Alternative Names (SAN). Specifically, Botan incorrectly allowed certificates with mixed-case CNs to bypass DNS name constraints, potentially permitting unauthorized certificates to be accepted. This flaw could lead to integrity violations by accepting malicious certificates that should have been rejected. The issue has been fixed in Botan 3. 11. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 21:09:29 UTC

Technical Analysis

Botan is a widely used C++ cryptography library that handles X.509 certificate path validation among other cryptographic functions. Prior to version 3.11.0, Botan implemented a check for DNS name constraints on certificates that lacked a Subject Alternative Name (SAN) extension by validating the Common Name (CN) field against the allowed DNS names. According to RFC 5280, if SANs are present, CN should not be used for name validation, but Botan performed this CN check when SAN was absent. The vulnerability arises because Botan's comparison of the CN against the DNS name constraints was case-sensitive, failing to normalize or perform a case-insensitive comparison. This allowed a certificate with a mixed-case CN, such as "Sub.EVIL.COM", to bypass excludedSubtrees constraints that should have blocked domains like "evil.com". This improper certificate validation (CWE-295) could allow an attacker to present a malicious certificate that appears valid under Botan's validation logic, potentially undermining the integrity of TLS or other cryptographic protocols relying on Botan. The vulnerability is identified as CVE-2026-32884 and has a CVSS 3.1 base score of 5.9 (medium severity), reflecting its impact on integrity without affecting confidentiality or availability. The issue was patched in Botan version 3.11.0 by correcting the case sensitivity in the CN comparison logic to properly enforce DNS name constraints as per RFC 5280.

Potential Impact

This vulnerability impacts any application or system that uses Botan versions prior to 3.11.0 for X.509 certificate validation, especially where name constraints are enforced to restrict acceptable DNS names in certificates. The improper validation could allow attackers to bypass domain restrictions by exploiting case sensitivity in CN fields, potentially enabling man-in-the-middle (MITM) attacks, unauthorized access, or impersonation of trusted entities. Although the vulnerability does not directly expose confidentiality or availability, the integrity compromise can undermine trust in secure communications, digital signatures, and authentication mechanisms relying on Botan. Organizations using Botan in security-sensitive applications such as VPNs, secure messaging, embedded devices, or TLS libraries may be at risk. The absence of known exploits in the wild suggests limited current exploitation, but the vulnerability remains a significant risk if unpatched, especially in environments with strict domain name constraints.

Mitigation Recommendations

The primary mitigation is to upgrade Botan to version 3.11.0 or later, where the certificate validation logic has been corrected to perform case-insensitive comparisons of CN fields against DNS name constraints. For organizations unable to immediately upgrade, a temporary mitigation could involve implementing additional certificate validation checks externally to Botan, ensuring case-insensitive matching of CN against name constraints or enforcing the presence of SAN extensions in certificates. Developers should audit their use of Botan for certificate validation and avoid relying solely on CN fields when SANs are absent, aligning with RFC 5280 best practices. Additionally, monitoring for suspicious certificates with mixed-case CNs that could exploit this flaw is advisable. Security teams should also review their cryptographic libraries and dependencies to confirm Botan versions and patch status, and consider compensating controls such as certificate pinning or enhanced validation in client applications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-16T21:03:44.421Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cae2bce6bfc5ba1d6c3e48

Added to database: 3/30/2026, 8:53:16 PM

Last enriched: 3/30/2026, 9:09:29 PM

Last updated: 3/30/2026, 9:54:50 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses