An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, leading to arbitrary code execution. This is caused by Incorrect Use of Privileged APIs.
History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Arbitrary Code Execution via Deserialization of SSL Context in Mbed TLS
First Time appeared Mbed
Mbed mbedtls
Vendors & Products Mbed
Mbed mbedtls

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, leading to arbitrary code execution. This is caused by Incorrect Use of Privileged APIs.
Weaknesses CWE-250
CWE-502
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-02T17:52:53.594Z

Reserved: 2026-03-31T00:00:00.000Z

Link: CVE-2026-34877

cve-icon Vulnrichment

Updated: 2026-04-02T17:50:56.222Z

cve-icon NVD

Status : Received

Published: 2026-04-02T17:16:26.927

Modified: 2026-04-02T18:16:34.143

Link: CVE-2026-34877

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:59Z