<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Crypto — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/crypto/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 08:43:55 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/crypto/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-32283 Unauthenticated TLS 1.3 KeyUpdate DoS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tls-keyupdate-dos/</link><pubDate>Thu, 30 Apr 2026 08:43:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tls-keyupdate-dos/</guid><description>CVE-2026-32283 is a vulnerability in crypto/tls that allows unauthenticated TLS 1.3 KeyUpdate records, leading to persistent connection retention and a denial-of-service condition.</description><content:encoded><![CDATA[<p>CVE-2026-32283 describes a vulnerability within the crypto/tls component related to the processing of TLS 1.3 KeyUpdate records. The core issue stems from the lack of proper authentication for these KeyUpdate records. An attacker exploiting this flaw can send unauthenticated KeyUpdate records to a vulnerable server. The server, upon processing these records, may retain connections persistently or enter a denial-of-service (DoS) state due to resource exhaustion. This vulnerability poses a significant risk to systems relying on TLS 1.3 for secure communication. While the specific vulnerable products are not detailed in the source, the report does mention Microsoft as the affected vendor. Defenders must identify and patch the vulnerable crypto/tls implementations to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a TLS 1.3 connection with a vulnerable server.</li>
<li>Attacker crafts a malicious TLS 1.3 KeyUpdate record without proper authentication.</li>
<li>Attacker sends the unauthenticated KeyUpdate record to the target server over the established TLS connection.</li>
<li>The vulnerable crypto/tls implementation on the server processes the malformed KeyUpdate record.</li>
<li>Due to the lack of proper validation, the server&rsquo;s connection state becomes inconsistent.</li>
<li>The server retains the connection persistently due to the invalid state.</li>
<li>Attacker repeats steps 2-6 to exhaust server resources with numerous persistent connections.</li>
<li>The server enters a denial-of-service (DoS) condition, becoming unresponsive to legitimate requests.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32283 can lead to a denial-of-service condition, rendering affected servers unavailable. The number of affected victims will vary based on the deployment of vulnerable crypto/tls implementations. Services relying on TLS 1.3 for secure communication are at risk. If the attack succeeds, legitimate users will be unable to access the affected services, potentially causing significant disruption and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all systems using the crypto/tls component from Microsoft to determine if they are vulnerable to CVE-2026-32283.</li>
<li>Apply the security updates released by Microsoft to patch CVE-2026-32283 on all affected systems as soon as they are available, according to the Microsoft Security Update Guide.</li>
<li>Monitor network traffic for suspicious TLS KeyUpdate records, focusing on malformed or unauthenticated packets using a network intrusion detection system (NIDS).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>tls</category><category>crypto/tls</category></item><item><title>Mbed TLS FFDH Public Key Export Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-04-mbedtls-overflow/</link><pubDate>Wed, 01 Apr 2026 18:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mbedtls-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-34875) exists in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0 during public key export for FFDH keys, potentially leading to code execution or denial of service.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability has been identified in Mbed TLS, a widely used open-source cryptographic library. Specifically, CVE-2026-34875 affects Mbed TLS versions up to 3.6.5 and TF-PSA-Crypto 1.0.0. The vulnerability is triggered during the export of public keys associated with Finite Field Diffie-Hellman (FFDH) algorithms. This flaw can be exploited by an attacker to overwrite memory buffers, potentially leading to arbitrary code execution or a denial-of-service condition. Given the prevalence of Mbed TLS in embedded systems and other security-sensitive applications, this vulnerability poses a significant risk to a wide range of devices and services. Defenders should prioritize patching and mitigation efforts to prevent potential exploitation. The vulnerability was published on 2026-04-01.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a system using a vulnerable version of Mbed TLS (&lt;= 3.6.5) or TF-PSA-Crypto (1.0.0).</li>
<li>Attacker crafts a malicious request that triggers the FFDH public key export function.</li>
<li>The vulnerable function fails to properly validate the size of the buffer used to store the exported public key.</li>
<li>The application attempts to copy the public key data into the undersized buffer.</li>
<li>A buffer overflow occurs, overwriting adjacent memory regions.</li>
<li>The attacker gains control of program execution by overwriting critical data structures or function pointers.</li>
<li>The attacker executes arbitrary code on the target system.</li>
<li>The attacker achieves their final objective, such as gaining unauthorized access, stealing sensitive data, or causing a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34875 can lead to a variety of severe consequences. The most critical outcome is arbitrary code execution, allowing attackers to gain complete control over the affected system. This could result in the theft of sensitive data, installation of malware, or disruption of critical services. Even without achieving code execution, the buffer overflow can cause a denial-of-service condition, rendering the system unusable. The wide adoption of Mbed TLS means that this vulnerability has the potential to impact numerous devices and applications across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Mbed TLS to a patched version (later than 3.6.5) or TF-PSA-Crypto to a version that includes the fix for CVE-2026-34875.</li>
<li>Apply input validation to any data that is used in the FFDH public key export functionality as a short-term workaround.</li>
<li>Deploy the provided Sigma rule <code>Detect_MbedTLS_FFDH_Public_Key_Export</code> to identify potential exploitation attempts by monitoring process memory writes in Mbed TLS processes.</li>
<li>Monitor web server logs for anomalies in requests related to TLS key exchange, in combination with MbedTLS to catch abnormal activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>mbedtls</category><category>crypto</category><category>cve-2026-34875</category></item></channel></rss>