Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2026-38 |
|
Thu, 14 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aria2 Project
Aria2 Project aria2 |
|
| Vendors & Products |
Aria2 Project
Aria2 Project aria2 |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | aria2c accepts a server certificate with incorrect Extended Key Usage (EKU). If the attackers compromise a certificate (with the associated private key) issued for a different purpose, they may be able to reuse it for TLS server authentication. | |
| Title | aria2c Improper Certificate Validation | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-05-13T18:35:03.804Z
Reserved: 2026-05-11T20:46:54.600Z
Link: CVE-2026-8367
No data.
Status : Awaiting Analysis
Published: 2026-05-13T16:17:04.780
Modified: 2026-05-13T16:27:11.127
Link: CVE-2026-8367
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:30:15Z