Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
History

Tue, 25 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Mar 2025 06:00:00 +0000

Type Values Removed Values Added
Description Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
Weaknesses CWE-908
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-03-25T00:00:00.000Z

Updated: 2025-03-25T14:37:14.294Z

Reserved: 2025-03-07T00:00:00.000Z

Link: CVE-2025-27810

cve-icon Vulnrichment

Updated: 2025-03-25T14:37:08.684Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-25T06:15:41.180

Modified: 2025-03-27T16:45:46.410

Link: CVE-2025-27810

cve-icon Redhat

No data.