Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1026158?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "type": "deb", "namespace": "debian", "name": "mbedtls", "version": "3.6.5-0.1~deb13u1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/203618?format=api", "vulnerability_id": "VCID-4sbv-dqyv-6baw", "summary": "An issue was discovered in Mbed TLS before 2.28.9 and 3.x before 3.6.1, in which the user-selected algorithm is not used. Unlike previously documented, enabling MBEDTLS_PSA_HMAC_DRBG_MD_TYPE does not cause the PSA subsystem to use HMAC_DRBG: it uses HMAC_DRBG only when MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG and MBEDTLS_CTR_DRBG_C are disabled.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45157", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3123", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37238", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36752", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36819", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36843", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36766", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36788", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36864", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.3737", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37396", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37224", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37289", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37266", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37284", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37267", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37213", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36989", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36957", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.3687", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45157" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/", "reference_id": "mbedtls-security-advisory-2024-08-1", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/", "reference_id": "releases", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls/releases/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1116190?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.6-0.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.6-0.1" } ], "aliases": [ "CVE-2024-45157" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4sbv-dqyv-6baw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/267520?format=api", "vulnerability_id": "VCID-jeen-6u3v-8qab", "summary": "An issue was discovered in Mbed TLS before 3.6.6 and 4.x before 4.1.0 and TF-PSA-Crypto before 1.1.0. There is a Predictable Seed in a Pseudo-Random Number Generator (PRNG).", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01918", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02755", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02764", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02644", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02742", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02679", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02665", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02662", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04146", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.05016", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04973", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.05014", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.05021", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.05017", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.05015", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04922", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34871" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577", "reference_id": "1132577", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-dev-random/", "reference_id": "mbedtls-security-advisory-2026-03-dev-random", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T20:04:03Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-dev-random/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T20:04:03Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1116190?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.6-0.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.6-0.1" } ], "aliases": [ "CVE-2026-34871" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jeen-6u3v-8qab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/349238?format=api", "vulnerability_id": "VCID-ph4w-4hud-mkck", "summary": "An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_len parameter. This is caused by missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer. The issue affects the public multipart CCM API in Mbed TLS 3.x, where mbedtls_ccm_finish() can be invoked directly by applications. In Mbed TLS 4.x versions prior to the fix, the same missing validation exists in the internal implementation; however, the function is not exposed as part of the public API. Exploitation requires application-level invocation of the multipart CCM API.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34876", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03384", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03993", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0492", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0474", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04959", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04885", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04821", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04832", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04798", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04731", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06676", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07591", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07554", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07536", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07553", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07592", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07337", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07487", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34876" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34876", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34876" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577", "reference_id": "1132577", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-ccm-finish-boundary-check/", "reference_id": "mbedtls-security-advisory-2026-03-ccm-finish-boundary-check", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-02T15:53:54Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-ccm-finish-boundary-check/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-02T15:53:54Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1116190?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.6-0.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.6-0.1" } ], "aliases": [ "CVE-2026-34876" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ph4w-4hud-mkck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/349242?format=api", "vulnerability_id": "VCID-x8et-cun9-6kgz", "summary": "An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, leading to arbitrary code execution. This is caused by Incorrect Use of Privileged APIs.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34877", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35266", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35555", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35244", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35559", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35526", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35565", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42212", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44614", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44556", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44493", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44522", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44594", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44468", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44538", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34877" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34877" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577", "reference_id": "1132577", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-serialized-data/", "reference_id": "mbedtls-security-advisory-2026-03-serialized-data", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:51:48Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-serialized-data/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:51:48Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1116190?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.6-0.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.6-0.1" } ], "aliases": [ "CVE-2026-34877" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8et-cun9-6kgz" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/203618?format=api", "vulnerability_id": "VCID-4sbv-dqyv-6baw", "summary": "An issue was discovered in Mbed TLS before 2.28.9 and 3.x before 3.6.1, in which the user-selected algorithm is not used. Unlike previously documented, enabling MBEDTLS_PSA_HMAC_DRBG_MD_TYPE does not cause the PSA subsystem to use HMAC_DRBG: it uses HMAC_DRBG only when MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG and MBEDTLS_CTR_DRBG_C are disabled.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45157", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3123", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37238", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36752", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36819", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36843", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36766", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36788", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36864", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.3737", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37396", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37224", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37289", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37266", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37284", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37267", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37213", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36989", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36957", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.3687", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45157" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/", "reference_id": "mbedtls-security-advisory-2024-08-1", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/", "reference_id": "releases", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls/releases/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1116190?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.6-0.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.6-0.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2024-45157" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4sbv-dqyv-6baw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56861?format=api", "vulnerability_id": "VCID-5bxk-rknm-zfhc", "summary": "Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could lead to information disclosure or denial of service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23775", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6043", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60271", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60317", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60376", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60332", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6036", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6042", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60252", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60323", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60304", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60344", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60352", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6034", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60312", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60327", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60315", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23775" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775" }, { "reference_url": "https://security.gentoo.org/glsa/202409-14", "reference_id": "GLSA-202409-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-14" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5/", "reference_id": "GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2/", "reference_id": "IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/", "reference_id": "mbedtls-security-advisory-2024-01-2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:39Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/" }, { "reference_url": "https://usn.ubuntu.com/8123-1/", "reference_id": "USN-8123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8123-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2024-23775" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bxk-rknm-zfhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96752?format=api", "vulnerability_id": "VCID-7ppw-f9jy-k7ae", "summary": "Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-52497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26121", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25887", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26008", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25918", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25899", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26308", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26249", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27408", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27642", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2759", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27482", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.5849", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58589", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58535", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58518", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58434", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58477", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.586", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-52497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52497" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108786", "reference_id": "1108786", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108786" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-2.md", "reference_id": "mbedtls-security-advisory-2025-06-2.md", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:18:40Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-2.md" }, { "reference_url": "https://usn.ubuntu.com/8123-1/", "reference_id": "USN-8123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8123-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026157?format=api", "purl": "pkg:deb/debian/mbedtls@2.28.3-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-5bxk-rknm-zfhc" }, { "vulnerability": "VCID-7ppw-f9jy-k7ae" }, { "vulnerability": "VCID-7v3a-5q44-cucz" }, { "vulnerability": "VCID-98cg-wuhp-qudq" }, { "vulnerability": "VCID-f1fz-b8b6-dfb8" }, { "vulnerability": "VCID-gvkn-6e2m-dyez" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-kchn-2wez-bbb2" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-pj6w-rufw-nqgd" }, { "vulnerability": "VCID-vp4q-81cq-33cw" }, { "vulnerability": "VCID-vs6q-c4ug-xfer" }, { "vulnerability": "VCID-wsvw-6tmk-3kdj" }, { "vulnerability": "VCID-x8et-cun9-6kgz" }, { "vulnerability": "VCID-zpq1-dwvf-8ka2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2025-52497" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ppw-f9jy-k7ae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96734?format=api", "vulnerability_id": "VCID-7v3a-5q44-cucz", "summary": "Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48965", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13737", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13673", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13806", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13688", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18643", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18655", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18673", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18565", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18544", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18504", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18376", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20001", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20024", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20113", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20114", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19942", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2003", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48965" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108790", "reference_id": "1108790", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108790" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-6.md", "reference_id": "mbedtls-security-advisory-2025-06-6.md", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-23T14:32:31Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-6.md" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-23T14:32:31Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/" }, { "reference_url": "https://usn.ubuntu.com/8123-1/", "reference_id": "USN-8123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8123-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026157?format=api", "purl": "pkg:deb/debian/mbedtls@2.28.3-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-5bxk-rknm-zfhc" }, { "vulnerability": "VCID-7ppw-f9jy-k7ae" }, { "vulnerability": "VCID-7v3a-5q44-cucz" }, { "vulnerability": "VCID-98cg-wuhp-qudq" }, { "vulnerability": "VCID-f1fz-b8b6-dfb8" }, { "vulnerability": "VCID-gvkn-6e2m-dyez" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-kchn-2wez-bbb2" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-pj6w-rufw-nqgd" }, { "vulnerability": "VCID-vp4q-81cq-33cw" }, { "vulnerability": "VCID-vs6q-c4ug-xfer" }, { "vulnerability": "VCID-wsvw-6tmk-3kdj" }, { "vulnerability": "VCID-x8et-cun9-6kgz" }, { "vulnerability": "VCID-zpq1-dwvf-8ka2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2025-48965" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7v3a-5q44-cucz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96725?format=api", "vulnerability_id": "VCID-98cg-wuhp-qudq", "summary": "Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47917", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0361", "scoring_system": "epss", "scoring_elements": "0.87753", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0361", "scoring_system": "epss", "scoring_elements": "0.87739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88948", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.8892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88938", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88949", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88961", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88959", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88972", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.8898", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04351", "scoring_system": "epss", "scoring_elements": "0.88987", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05164", "scoring_system": "epss", "scoring_elements": "0.8996", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05164", "scoring_system": "epss", "scoring_elements": "0.89963", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05164", "scoring_system": "epss", "scoring_elements": "0.89978", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.05164", "scoring_system": "epss", "scoring_elements": "0.89988", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.05164", "scoring_system": "epss", "scoring_elements": "0.89949", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05164", "scoring_system": "epss", "scoring_elements": "0.89955", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47917" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108791", "reference_id": "1108791", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108791" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/52427.c", "reference_id": "CVE-2025-47917", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/52427.c" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md", "reference_id": "mbedtls-security-advisory-2025-06-7.md", "reference_type": "", "scores": [ { "value": "8.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-22T14:22:32Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "8.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-22T14:22:32Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/" }, { "reference_url": "https://usn.ubuntu.com/8123-1/", "reference_id": "USN-8123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8123-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026157?format=api", "purl": "pkg:deb/debian/mbedtls@2.28.3-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-5bxk-rknm-zfhc" }, { "vulnerability": "VCID-7ppw-f9jy-k7ae" }, { "vulnerability": "VCID-7v3a-5q44-cucz" }, { "vulnerability": "VCID-98cg-wuhp-qudq" }, { "vulnerability": "VCID-f1fz-b8b6-dfb8" }, { "vulnerability": "VCID-gvkn-6e2m-dyez" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-kchn-2wez-bbb2" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-pj6w-rufw-nqgd" }, { "vulnerability": "VCID-vp4q-81cq-33cw" }, { "vulnerability": "VCID-vs6q-c4ug-xfer" }, { "vulnerability": "VCID-wsvw-6tmk-3kdj" }, { "vulnerability": "VCID-x8et-cun9-6kgz" }, { "vulnerability": "VCID-zpq1-dwvf-8ka2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2025-47917" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98cg-wuhp-qudq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56860?format=api", "vulnerability_id": "VCID-f1fz-b8b6-dfb8", "summary": "Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could lead to information disclosure or denial of service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23170", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43041", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.42893", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.42969", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.42988", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.42928", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.42958", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43023", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43184", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43213", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.4315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43202", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43237", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43203", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43188", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43173", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43107", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43109", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43027", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23170" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23170" }, { "reference_url": "https://security.gentoo.org/glsa/202409-14", "reference_id": "GLSA-202409-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-14" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5/", "reference_id": "GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T15:14:22Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2/", "reference_id": "IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T15:14:22Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/", "reference_id": "mbedtls-security-advisory-2024-01-1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T15:14:22Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2024-23170" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1fz-b8b6-dfb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96595?format=api", "vulnerability_id": "VCID-gvkn-6e2m-dyez", "summary": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted certificates for arbitrary hostnames unless the TLS client application calls mbedtls_ssl_set_hostname.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23872", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23818", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23832", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23788", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23731", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23741", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23729", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23595", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23585", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2355", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23701", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33609", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33632", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33654", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.3373", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33754", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33678", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33721", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27809" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101499", "reference_id": "1101499", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101499" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-1/", "reference_id": "mbedtls-security-advisory-2025-03-1", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:41:49Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-1/" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases", "reference_id": "releases", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:41:49Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls/releases" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2025-27809" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gvkn-6e2m-dyez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96596?format=api", "vulnerability_id": "VCID-kchn-2wez-bbb2", "summary": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27101", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27147", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27153", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27051", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.2706", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27035", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.26997", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.26951", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.26944", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.26879", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27239", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36207", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36223", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36246", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36319", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36337", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36281", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36308", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27810" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101499", "reference_id": "1101499", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101499" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/", "reference_id": "mbedtls-security-advisory-2025-03-2", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:36:57Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases", "reference_id": "releases", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:36:57Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls/releases" }, { "reference_url": "https://usn.ubuntu.com/8123-1/", "reference_id": "USN-8123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8123-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2025-27810" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kchn-2wez-bbb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96797?format=api", "vulnerability_id": "VCID-pj6w-rufw-nqgd", "summary": "Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54764", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03308", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03287", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05689", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05678", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05682", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05688", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05334", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05356", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05307", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05308", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05464", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05503", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05544", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05549", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05594", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0567", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54764" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118750", "reference_id": "1118750", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118750" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-10-ssbleed-mstep/", "reference_id": "mbedtls-security-advisory-2025-10-ssbleed-mstep", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-21T13:52:18Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-10-ssbleed-mstep/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-21T13:52:18Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2025-54764" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pj6w-rufw-nqgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96822?format=api", "vulnerability_id": "VCID-vp4q-81cq-33cw", "summary": "Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59438", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09457", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09456", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1302", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13047", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12855", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12927", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12915", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12941", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13015", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13099", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12902", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13032", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12812", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12815", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12913", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12938", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12903", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12707", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59438" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59438", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59438" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118752", "reference_id": "1118752", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118752" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-10-invalid-padding-error/", "reference_id": "mbedtls-security-advisory-2025-10-invalid-padding-error", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-21T16:06:28Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-10-invalid-padding-error/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-21T16:06:28Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026157?format=api", "purl": "pkg:deb/debian/mbedtls@2.28.3-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-5bxk-rknm-zfhc" }, { "vulnerability": "VCID-7ppw-f9jy-k7ae" }, { "vulnerability": "VCID-7v3a-5q44-cucz" }, { "vulnerability": "VCID-98cg-wuhp-qudq" }, { "vulnerability": "VCID-f1fz-b8b6-dfb8" }, { "vulnerability": "VCID-gvkn-6e2m-dyez" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-kchn-2wez-bbb2" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-pj6w-rufw-nqgd" }, { "vulnerability": "VCID-vp4q-81cq-33cw" }, { "vulnerability": "VCID-vs6q-c4ug-xfer" }, { "vulnerability": "VCID-wsvw-6tmk-3kdj" }, { "vulnerability": "VCID-x8et-cun9-6kgz" }, { "vulnerability": "VCID-zpq1-dwvf-8ka2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2025-59438" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vp4q-81cq-33cw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96048?format=api", "vulnerability_id": "VCID-vs6q-c4ug-xfer", "summary": "An issue was discovered in Mbed TLS 3.5.x before 3.6.0. When an SSL context was reset with the mbedtls_ssl_session_reset() API, the maximum TLS version to be negotiated was not restored to the configured one. An attacker was able to prevent an Mbed TLS server from establishing any TLS 1.3 connection, potentially resulting in a Denial of Service or forced version downgrade from TLS 1.3 to TLS 1.2.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28755", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31609", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31743", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31511", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31582", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31592", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31501", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31524", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31593", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32176", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32117", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32121", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32052", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32086", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32064", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32036", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31871", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28755" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077686", "reference_id": "1077686", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077686" }, { "reference_url": "https://github.com/hey3e", "reference_id": "hey3e", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-29T15:04:39Z/" } ], "url": "https://github.com/hey3e" }, { "reference_url": "https://hey3e.github.io", "reference_id": "hey3e.github.io", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-29T15:04:39Z/" } ], "url": "https://hey3e.github.io" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-29T15:04:39Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0", "reference_id": "v3.6.0", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-29T15:04:39Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2024-28755" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vs6q-c4ug-xfer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77128?format=api", "vulnerability_id": "VCID-wsvw-6tmk-3kdj", "summary": "mbedtls: Insecure handling of shared memory in PSA Crypto APIs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35216", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35561", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35322", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35301", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35222", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35104", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35174", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35202", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35108", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35131", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.352", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35665", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3569", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3557", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3564", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35649", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35605", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35621", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35611", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28960" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272172", "reference_id": "2272172", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272172" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YE3QRREGJC6K34JD4LZ5P3IALNX4QYY/", "reference_id": "5YE3QRREGJC6K34JD4LZ5P3IALNX4QYY", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-02T17:49:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YE3QRREGJC6K34JD4LZ5P3IALNX4QYY/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6UZNBMKYEV2J5DI7R4BQGL472V7X3WJY/", "reference_id": "6UZNBMKYEV2J5DI7R4BQGL472V7X3WJY", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-02T17:49:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6UZNBMKYEV2J5DI7R4BQGL472V7X3WJY/" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md", "reference_id": "mbedtls-security-advisory-2024-03.md", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-02T17:49:02Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NCDU52ZDA7TX3HC5JCU6ZZIJQOPTNBK6/", "reference_id": "NCDU52ZDA7TX3HC5JCU6ZZIJQOPTNBK6", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-02T17:49:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NCDU52ZDA7TX3HC5JCU6ZZIJQOPTNBK6/" }, { "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "reference_id": "security-advisories", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-02T17:49:02Z/" } ], "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2024-28960" ], "risk_score": 3.7, "exploitability": "0.5", "weighted_severity": "7.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wsvw-6tmk-3kdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96751?format=api", "vulnerability_id": "VCID-zpq1-dwvf-8ka2", "summary": "Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-52496", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09375", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09086", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0936", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09139", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09059", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0917", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1139", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11293", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11445", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11348", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11278", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27675", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27694", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27578", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27641", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27663", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27582", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27597", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-52496" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52496" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108785", "reference_id": "1108785", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108785" }, { "reference_url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-1.md", "reference_id": "mbedtls-security-advisory-2025-06-1.md", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-08T14:07:04Z/" } ], "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-1.md" }, { "reference_url": "https://usn.ubuntu.com/8123-1/", "reference_id": "USN-8123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8123-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1026157?format=api", "purl": "pkg:deb/debian/mbedtls@2.28.3-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-5bxk-rknm-zfhc" }, { "vulnerability": "VCID-7ppw-f9jy-k7ae" }, { "vulnerability": "VCID-7v3a-5q44-cucz" }, { "vulnerability": "VCID-98cg-wuhp-qudq" }, { "vulnerability": "VCID-f1fz-b8b6-dfb8" }, { "vulnerability": "VCID-gvkn-6e2m-dyez" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-kchn-2wez-bbb2" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-pj6w-rufw-nqgd" }, { "vulnerability": "VCID-vp4q-81cq-33cw" }, { "vulnerability": "VCID-vs6q-c4ug-xfer" }, { "vulnerability": "VCID-wsvw-6tmk-3kdj" }, { "vulnerability": "VCID-x8et-cun9-6kgz" }, { "vulnerability": "VCID-zpq1-dwvf-8ka2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026158?format=api", "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sbv-dqyv-6baw" }, { "vulnerability": "VCID-jeen-6u3v-8qab" }, { "vulnerability": "VCID-ph4w-4hud-mkck" }, { "vulnerability": "VCID-x8et-cun9-6kgz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" } ], "aliases": [ "CVE-2025-52496" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zpq1-dwvf-8ka2" } ], "risk_score": "2.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1" }