First published: Fri Aug 20 2021(Updated: )
In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Californium | >=2.0.0<2.6.5 | |
Eclipse Californium | =3.0.0-m1 | |
Eclipse Californium | =3.0.0-m2 | |
Eclipse Californium | =3.0.0-m3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-34433.
The severity level of CVE-2021-34433 is high (7.5).
Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3 are affected by CVE-2021-34433.
CVE-2021-34433 allows certificate-based DTLS handshakes to succeed without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange.
Yes, you can find more information about CVE-2021-34433 at the following link: https://bugs.eclipse.org/bugs/show_bug.cgi?id=575281