<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tls-1.3 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/tls-1.3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 08:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/tls-1.3/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cesanta Mongoose TLS 1.3 Heap-Based Buffer Overflow Vulnerability (CVE-2026-5244)</title><link>https://feed.craftedsignal.io/briefs/2026-04-mongoose-tls-overflow/</link><pubDate>Thu, 02 Apr 2026 08:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mongoose-tls-overflow/</guid><description>A remote heap-based buffer overflow vulnerability exists in Cesanta Mongoose versions up to 7.20 due to improper handling of the pubkey argument in the mg_tls_recv_cert function, potentially leading to code execution.</description><content:encoded><![CDATA[<p>A heap-based buffer overflow vulnerability, identified as CVE-2026-5244, has been discovered in Cesanta Mongoose versions up to 7.20. This flaw resides within the <code>mg_tls_recv_cert</code> function in the <code>mongoose.c</code> file, specifically affecting the TLS 1.3 handler. The vulnerability can be triggered by manipulating the <code>pubkey</code> argument, which leads to memory corruption. The exploit for this vulnerability is publicly available, increasing the risk of exploitation. Successful exploitation could allow a remote attacker to execute arbitrary code on the affected system. Cesanta has addressed this issue in version 7.21, with patch <code>0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker initiates a TLS 1.3 handshake with a vulnerable Mongoose server.</li>
<li>The attacker crafts a malicious TLS certificate containing an oversized <code>pubkey</code>.</li>
<li>The <code>mg_tls_recv_cert</code> function processes the certificate.</li>
<li>Due to insufficient bounds checking, the oversized <code>pubkey</code> overwrites the heap buffer.</li>
<li>The heap overflow corrupts adjacent memory regions.</li>
<li>The attacker leverages memory corruption to gain control of program execution.</li>
<li>The attacker injects and executes arbitrary code on the server.</li>
<li>The attacker achieves complete control over the vulnerable system, potentially leading to data exfiltration or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5244 allows a remote attacker to execute arbitrary code on systems running vulnerable versions of Cesanta Mongoose. This could lead to complete system compromise, data breaches, and denial-of-service conditions. Given the widespread use of Mongoose in embedded systems and IoT devices, a successful attack could impact a large number of devices across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Cesanta Mongoose version 7.21 or later to patch CVE-2026-5244, using the provided patch ID <code>0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1</code>.</li>
<li>Monitor web server logs for unusual TLS handshake patterns or certificate errors that could indicate exploitation attempts against vulnerable Mongoose instances. Utilize the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement network intrusion detection systems (IDS) to detect and block malicious TLS traffic targeting vulnerable Mongoose servers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5244</category><category>heap-based-buffer-overflow</category><category>tls-1.3</category><category>remote-code-execution</category></item></channel></rss>