Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-Bounds Read in Mbed TLS CCM Finish Function |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arm
Arm mbed Tls |
|
| CPEs | cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Arm
Arm mbed Tls |
Fri, 03 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-Bounds Read in Mbed TLS CCM Finish Function |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out‑of‑Bounds Read in Mbed TLS CCM API Enabling Information Disclosure | |
| Weaknesses | CWE-119 CWE-200 |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out‑of‑Bounds Read in Mbed TLS CCM API Enabling Information Disclosure | |
| First Time appeared |
Mbed-tls
Mbed-tls mbedtls |
|
| Weaknesses | CWE-119 CWE-125 CWE-200 |
|
| Vendors & Products |
Mbed-tls
Mbed-tls mbedtls |
|
| Metrics |
cvssV3_1
|
Thu, 02 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_len parameter. This is caused by missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer. The issue affects the public multipart CCM API in Mbed TLS 3.x, where mbedtls_ccm_finish() can be invoked directly by applications. In Mbed TLS 4.x versions prior to the fix, the same missing validation exists in the internal implementation; however, the function is not exposed as part of the public API. Exploitation requires application-level invocation of the multipart CCM API. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-02T15:54:45.230Z
Reserved: 2026-03-31T00:00:00.000Z
Link: CVE-2026-34876
Updated: 2026-04-02T15:54:17.890Z
Status : Analyzed
Published: 2026-04-02T16:16:26.180
Modified: 2026-04-07T12:14:22.150
Link: CVE-2026-34876
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:56:38Z