Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qwfw-ggxw-577c | ex_webrtc client-role handshake is missing DTLS peer fingerprint validation |
Fri, 15 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1. | |
| Title | Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role handshake | |
| Weaknesses | CWE-295 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T11:22:24.715Z
Reserved: 2026-05-07T17:07:09.317Z
Link: CVE-2026-44700
Updated: 2026-05-15T11:22:19.343Z
Status : Deferred
Published: 2026-05-14T21:16:47.907
Modified: 2026-05-15T14:53:48.823
Link: CVE-2026-44700
No data.
OpenCVE Enrichment
Updated: 2026-05-14T23:00:13Z
Github GHSA