CVE-2026-34875

Mbed · Mbed TLS / TF-PSA-Crypto

A buffer overflow vulnerability in Mbed TLS and TF-PSA-Crypto occurs during FFDH public key export, potentially leading to remote code execution.

Executive summary

Mbed TLS and TF-PSA-Crypto libraries are vulnerable to a critical buffer overflow during key export operations, which could allow attackers to execute arbitrary code.

Vulnerability

A buffer overflow exists in the public key export function for Finite-Field Diffie-Hellman (FFDH) keys. This memory corruption flaw can be triggered during the processing of specific key data, potentially allowing for code execution.

Business impact

With a CVSS score of 9.8, this vulnerability is critical. Since these libraries are often used in embedded systems and IoT devices, a successful exploit could lead to widespread device compromise, data interception, and loss of device integrity.

Remediation

Immediate Action: Developers must update their applications to use Mbed TLS versions beyond 3.6.5 or the latest TF-PSA-Crypto patches that address the buffer overflow.

Proactive Monitoring: Monitor for application crashes in services that utilize Mbed TLS for encrypted communications, as these may indicate exploitation attempts.

Compensating Controls: Use compiler-level protections such as stack canaries and address space layout randomization (ASLR) to mitigate the impact of buffer overflow vulnerabilities.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Immediate library updates are required for all software incorporating the affected Mbed TLS or TF-PSA-Crypto versions. Failure to patch may leave critical infrastructure and IoT devices vulnerable to remote exploitation.