CVE-2026-34872
Mbed · Mbed TLS / TF-PSA-Crypto
Improper input validation in Mbed TLS FFDH allows attackers to force shared secrets into a small set of values, compromising protocols that rely on contributory behavior.
Executive summary
Mbed TLS and TF-PSA-Crypto suffer from a cryptographic flaw in Finite-Field Diffie-Hellman (FFDH) that allows attackers to manipulate shared secrets, potentially compromising non-TLS encrypted sessions.
Vulnerability
A lack of contributory behavior in FFDH due to improper input validation allows a peer or an active network attacker to force the shared secret into a small, predictable set of values. While TLS itself is not affected, other protocols relying on FFDH contributory behavior are vulnerable.
Business impact
This vulnerability has a CVSS score of 9.1. For custom protocols or non-TLS implementations using these libraries, the flaw could lead to the total decryption of sensitive communications or successful man-in-the-middle attacks.
Remediation
Immediate Action: Update to the latest patched versions of Mbed TLS or TF-PSA-Crypto to ensure proper input validation and contributory behavior in FFDH operations.
Proactive Monitoring: Audit any custom cryptographic implementations that use these libraries to determine if they rely on the contributory properties of FFDH.
Compensating Controls: Transition to Elliptic Curve Diffie-Hellman (ECDH) where possible, as it is generally more robust against these types of cryptographic manipulation attacks.
Exploitation status
Public Exploit Available: No
Analyst recommendation
While the impact on standard TLS is minimal, the critical CVSS score reflects the risk to other applications. Developers should update their libraries immediately to maintain the cryptographic integrity of their systems.