Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34872: n/a

0
Critical
VulnerabilityCVE-2026-34872cvecve-2026-34872
Published: Wed Apr 01 2026 (04/01/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Crypto 1.0. There is a lack of contributory behavior in FFDH due to improper input validation. Using finite-field Diffie-Hellman, the other party can force the shared secret into a small set of values (lack of contributory behavior). This is a problem for protocols that depend on contributory behavior (which is not the case for TLS). The attack can be carried by the peer, or depending on the protocol by an active network attacker (person in the middle).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 20:24:31 UTC

Technical Analysis

CVE-2026-34872 affects Mbed TLS versions 3.5.x through 3.6.5 and TF-PSA-Crypto 1.0 by introducing a critical flaw in the finite-field Diffie-Hellman (FFDH) key exchange implementation. The vulnerability stems from improper input validation that leads to a lack of contributory behavior, meaning the shared secret can be manipulated by an attacker into a small, predictable set of values. Contributory behavior in key exchange protocols ensures that both parties equally influence the resulting shared secret, providing strong security guarantees. The absence of this property allows a malicious peer or an active network attacker (such as a man-in-the-middle) to reduce the entropy of the shared secret, potentially enabling cryptographic attacks or key recovery. While this issue does not impact standard TLS protocols, which do not rely on contributory behavior in FFDH, it poses a significant risk to other protocols or custom implementations that do. The vulnerability is remotely exploitable without authentication or user interaction, with a CVSS v3.1 score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical confidentiality and integrity impacts but no availability impact. No patches or known exploits are currently reported, but the severity and ease of exploitation necessitate immediate attention from organizations using these cryptographic libraries in relevant contexts.

Potential Impact

The primary impact of CVE-2026-34872 is the compromise of confidentiality and integrity of cryptographic keys established via finite-field Diffie-Hellman in affected libraries. By forcing the shared secret into a small set of values, attackers can potentially decrypt sensitive communications, impersonate legitimate parties, or inject malicious data in protocols relying on contributory key exchange. This undermines trust in secure communications and can lead to data breaches, unauthorized access, and disruption of secure services. Since the vulnerability is exploitable remotely without authentication or user interaction, it poses a significant risk to any system using the affected Mbed TLS or TF-PSA-Crypto versions in custom or non-TLS protocols. The lack of contributory behavior may also facilitate advanced cryptanalysis or key recovery attacks. Although no known exploits are reported yet, the critical CVSS score and the fundamental cryptographic weakness suggest that threat actors could develop effective exploits, especially targeting IoT devices, embedded systems, or specialized security applications using these libraries.

Mitigation Recommendations

Organizations should immediately identify and inventory all systems and applications using Mbed TLS versions 3.5.x through 3.6.5 and TF-PSA-Crypto 1.0. Since no official patches are currently available, mitigation should focus on: 1) Avoiding use of finite-field Diffie-Hellman key exchanges that rely on contributory behavior in affected libraries; 2) Applying strict input validation and sanity checks on Diffie-Hellman parameters at the application level to prevent manipulation of shared secrets; 3) Where possible, migrating to elliptic-curve Diffie-Hellman (ECDH) or other cryptographic algorithms not affected by this issue; 4) Monitoring network traffic for unusual handshake patterns indicative of exploitation attempts; 5) Implementing network-level protections such as TLS interception or firewall rules to limit exposure of vulnerable protocols; 6) Staying updated with vendor advisories for patches or updated library versions addressing this vulnerability; 7) Conducting security assessments and penetration testing focused on cryptographic protocol implementations to detect potential exploitation. These steps go beyond generic advice by emphasizing protocol-specific mitigations and proactive detection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-31T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74cfe6bfc5ba1df0104d

Added to database: 4/1/2026, 7:41:03 PM

Last enriched: 4/1/2026, 8:24:31 PM

Last updated: 4/5/2026, 9:57:18 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses