Insecure Default Initialization of Resource Affecting armmbed/mbedtls package, versions [,2.28.10)[3.0.0,3.6.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ARMMBEDMBEDTLS-9673796
  • published7 Apr 2025
  • disclosed23 Mar 2025
  • creditDaniel Stenberg

Introduced: 23 Mar 2025

NewCVE-2025-27809  (opens in a new tab)
CWE-1188  (opens in a new tab)

How to fix?

Upgrade armmbed/mbedtls to version 2.28.10, 3.6.3 or higher.

Overview

Affected versions of this package are vulnerable to Insecure Default Initialization of Resource when mbedtls_ssl_set_hostname() is not called by the client. Skipping this authentication step is the default behavior, and it enables an attacker to impersonate the server as long as they possess any valid certificate signed by a trusted CA.

Note: Under normal circumstances, the client must specify their target hostname twice - once when setting up a connection with mbedtls_net_connect(), and again when authenticating over that connection with mbedtls_ssl_set_hostname().

CVSS Base Scores

version 4.0
version 3.1