First published: Sun Jan 21 2024(Updated: )
An issue was discovered in Mbed TLS through 3.5.1. In mbedtls_ssl_session_reset, the maximum negotiable TLS version is mishandled. For example, if the last connection negotiated TLS 1.2, then 1.2 becomes the new maximum.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
mbed TLS | <3.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-52353 is rated as high due to the mishandling of maximum negotiable TLS versions.
To fix CVE-2023-52353, upgrade Mbed TLS to version 3.5.2 or later.
Mbed TLS versions up to 3.5.1 are affected by CVE-2023-52353.
Applications using Mbed TLS for secure communication are impacted by CVE-2023-52353.
Yes, CVE-2023-52353 can potentially allow attackers to exploit the mishandling of TLS versions, leading to downgrade attacks.