CVE-2026-34876
Mbed TLS vulnerability analysis and mitigation

An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_len parameter. This is caused by missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer. The issue affects the public multipart CCM API in Mbed TLS 3.x, where mbedtls_ccm_finish() can be invoked directly by applications. In Mbed TLS 4.x versions prior to the fix, the same missing validation exists in the internal implementation; however, the function is not exposed as part of the public API. Exploitation requires application-level invocation of the multipart CCM API.


SourceNVD

Related Mbed TLS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34877CRITICAL9.8
  • Mbed TLSMbed TLS
  • mbedtls
NoYesApr 02, 2026
CVE-2026-34873CRITICAL9.1
  • Mbed TLSMbed TLS
  • mbedtls-devel
NoYesApr 01, 2026
CVE-2026-34872CRITICAL9.1
  • Mbed TLSMbed TLS
  • cpe:2.3:a:arm:mbed_tls
NoYesApr 01, 2026
CVE-2026-34876HIGH7.5
  • Mbed TLSMbed TLS
  • mbedtls
NoYesApr 02, 2026
CVE-2025-66442MEDIUM5.1
  • Mbed TLSMbed TLS
  • mbedtls
NoNoApr 01, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management