<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tls — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/tls/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 08:43:55 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/tls/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-32283 Unauthenticated TLS 1.3 KeyUpdate DoS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tls-keyupdate-dos/</link><pubDate>Thu, 30 Apr 2026 08:43:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tls-keyupdate-dos/</guid><description>CVE-2026-32283 is a vulnerability in crypto/tls that allows unauthenticated TLS 1.3 KeyUpdate records, leading to persistent connection retention and a denial-of-service condition.</description><content:encoded><![CDATA[<p>CVE-2026-32283 describes a vulnerability within the crypto/tls component related to the processing of TLS 1.3 KeyUpdate records. The core issue stems from the lack of proper authentication for these KeyUpdate records. An attacker exploiting this flaw can send unauthenticated KeyUpdate records to a vulnerable server. The server, upon processing these records, may retain connections persistently or enter a denial-of-service (DoS) state due to resource exhaustion. This vulnerability poses a significant risk to systems relying on TLS 1.3 for secure communication. While the specific vulnerable products are not detailed in the source, the report does mention Microsoft as the affected vendor. Defenders must identify and patch the vulnerable crypto/tls implementations to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a TLS 1.3 connection with a vulnerable server.</li>
<li>Attacker crafts a malicious TLS 1.3 KeyUpdate record without proper authentication.</li>
<li>Attacker sends the unauthenticated KeyUpdate record to the target server over the established TLS connection.</li>
<li>The vulnerable crypto/tls implementation on the server processes the malformed KeyUpdate record.</li>
<li>Due to the lack of proper validation, the server&rsquo;s connection state becomes inconsistent.</li>
<li>The server retains the connection persistently due to the invalid state.</li>
<li>Attacker repeats steps 2-6 to exhaust server resources with numerous persistent connections.</li>
<li>The server enters a denial-of-service (DoS) condition, becoming unresponsive to legitimate requests.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32283 can lead to a denial-of-service condition, rendering affected servers unavailable. The number of affected victims will vary based on the deployment of vulnerable crypto/tls implementations. Services relying on TLS 1.3 for secure communication are at risk. If the attack succeeds, legitimate users will be unable to access the affected services, potentially causing significant disruption and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all systems using the crypto/tls component from Microsoft to determine if they are vulnerable to CVE-2026-32283.</li>
<li>Apply the security updates released by Microsoft to patch CVE-2026-32283 on all affected systems as soon as they are available, according to the Microsoft Security Update Guide.</li>
<li>Monitor network traffic for suspicious TLS KeyUpdate records, focusing on malformed or unauthenticated packets using a network intrusion detection system (NIDS).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>tls</category><category>crypto/tls</category></item><item><title>CVE-2026-34073: Incomplete DNS Name Constraint Enforcement Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-34073/</link><pubDate>Thu, 30 Apr 2026 07:46:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-34073/</guid><description>CVE-2026-34073 is a vulnerability in unspecified Microsoft products due to incomplete DNS name constraint enforcement on peer names, potentially leading to certificate validation bypass.</description><content:encoded><![CDATA[<p>CVE-2026-34073 describes a security vulnerability related to incomplete DNS name constraint enforcement affecting an unspecified Microsoft product. The vulnerability lies in the improper validation of peer names against DNS name constraints during certificate validation. An attacker could potentially exploit this flaw to bypass security checks and impersonate legitimate servers or services. Further details regarding the specific affected products and exploitation scenarios are currently unavailable but are anticipated to be released by Microsoft. Defenders should closely monitor Microsoft&rsquo;s official communication channels for updates and guidance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>As the vulnerability details are limited, the following attack chain is based on a generalized understanding of how incomplete DNS name constraint enforcement could be exploited.</p>
<ol>
<li>An attacker crafts a malicious certificate with a DNS name that is designed to bypass the incomplete constraint enforcement.</li>
<li>The attacker sets up a rogue server or service using the crafted certificate.</li>
<li>A client application (potentially within the Microsoft ecosystem) attempts to establish a secure connection with the attacker&rsquo;s server.</li>
<li>During the TLS handshake, the client application receives the malicious certificate.</li>
<li>Due to the incomplete DNS name constraint enforcement, the client application incorrectly validates the certificate as trusted.</li>
<li>A secure connection is established between the client and the attacker&rsquo;s server.</li>
<li>The attacker intercepts or manipulates data transmitted over the &ldquo;secure&rdquo; connection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34073 could allow an attacker to perform man-in-the-middle attacks, intercept sensitive data, or impersonate legitimate services. The specific impact depends on the affected product and the context in which the vulnerability is exploited. Given the potential for widespread impact within Microsoft environments, this vulnerability is considered high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Microsoft&rsquo;s Security Update Guide for specific product advisories and patches related to CVE-2026-34073 (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34073)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34073)</a>.</li>
<li>Deploy any available patches or workarounds as soon as they are released by Microsoft to mitigate the risk of exploitation.</li>
<li>Implement network monitoring to detect anomalous TLS certificate exchanges that may indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>certificate validation</category><category>man-in-the-middle</category><category>dns name constraint</category><category>tls</category><category>cve-2026-34073</category></item><item><title>rust-openssl Memory Leak via Unchecked Callback Length (CVE-2026-41898)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-leak/</link><pubDate>Wed, 29 Apr 2026 07:33:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-leak/</guid><description>CVE-2026-41898 describes a vulnerability in rust-openssl where unchecked callback-returned length in PSK and cookie generation can cause OpenSSL to leak adjacent memory to a network peer.</description><content:encoded><![CDATA[<p>CVE-2026-41898 is a security vulnerability affecting the rust-openssl library. The vulnerability stems from a failure to properly validate the length of data returned by callbacks during Pre-Shared Key (PSK) and cookie generation processes within OpenSSL. This oversight can lead to OpenSSL inadvertently exposing adjacent memory regions to a remote network peer. While the exact scope of impact is not detailed in the initial advisory, the potential for memory leakage raises concerns about sensitive information disclosure. Defenders should closely monitor applications utilizing rust-openssl for anomalous behavior indicative of exploitation attempts. The Microsoft Security Response Center published information regarding this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A client initiates a TLS handshake with a server using rust-openssl.</li>
<li>The server requests PSK or initiates a cookie exchange as part of the TLS handshake.</li>
<li>rust-openssl triggers a callback function to generate the PSK or cookie data.</li>
<li>The callback function returns data with a length that is not properly validated by rust-openssl.</li>
<li>Due to the unchecked length, OpenSSL reads beyond the intended buffer boundary.</li>
<li>OpenSSL copies the over-read memory region into the response sent to the client.</li>
<li>The client receives the response containing the leaked memory.</li>
<li>The client can then analyze the leaked memory for sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41898 can lead to the leakage of sensitive information from the server&rsquo;s memory. This information could include cryptographic keys, session data, or other confidential data. The extent of the leak depends on the amount of memory that is read beyond the intended buffer. The vulnerability could affect any application or service that uses rust-openssl for TLS communication and relies on PSK or cookie generation. The number of potential victims is currently unknown, but it would depend on the adoption rate of rust-openssl in security-sensitive applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusually large TLS handshake responses, which may indicate an attempt to trigger the memory leak.</li>
<li>Implement robust input validation for callback functions used in PSK and cookie generation within rust-openssl.</li>
<li>Deploy the Sigma rules provided to detect potential exploitation attempts based on anomalous network connection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>rust-openssl</category><category>memory-leak</category><category>tls</category><category>cve</category></item><item><title>Juju Controller Vulnerable to Unauthorized Database Access Due to Improper TLS Configuration</title><link>https://feed.craftedsignal.io/briefs/2026-04-juju-tls-vuln/</link><pubDate>Thu, 02 Apr 2026 00:03:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-juju-tls-vuln/</guid><description>Juju controller versions 3.2.0 up to 3.6.20 and 4.0.5 are vulnerable to unauthorized database access due to improper TLS client/server authentication and certificate verification, allowing an attacker with network access to modify all information, escalate privileges, and open firewall ports.</description><content:encoded><![CDATA[<p>Juju, a service orchestration tool, contains a critical vulnerability related to improper TLS configuration within its Dqlite database cluster. This vulnerability affects Juju controller versions 3.2.0 up to 3.6.20 and 4.0.5. The lack of client certificate checking and server certificate verification allows an attacker with network route-ability to the Juju controller&rsquo;s Dqlite cluster endpoint (port 17666) to join the cluster without proper authentication. This grants the attacker the ability to read and modify all information within the database, including sensitive user credentials and system configurations. Exploitation of this vulnerability enables privilege escalation, unauthorized access to resources, and potentially the ability to open firewall ports, leading to a complete compromise of the Juju controller and managed services. Patches are available in Juju versions 3.6.20 and 4.0.5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains network access to the target Juju controller&rsquo;s Dqlite cluster endpoint, typically port 17666.</li>
<li>The attacker uses a tool like <code>dqlite-demo</code> or a custom-built application leveraging the go-dqlite library to attempt to join the Dqlite cluster.</li>
<li>Due to the missing client certificate verification, the attacker&rsquo;s connection is accepted without proper authentication.</li>
<li>The attacker switches to the <code>controller</code> database using the <code>.switch controller</code> command within the dqlite shell.</li>
<li>The attacker queries the <code>user</code> table to identify existing users and their associated privileges using <code>select * from user;</code>.</li>
<li>The attacker modifies the <code>display_name</code> of the <code>admin</code> user within the <code>user</code> table using an <code>update</code> SQL command, for example: <code>update user set display_name='Compromised Admin' where name='admin';</code>.</li>
<li>The attacker could further modify credentials, add new administrative users, or modify system configurations within the database.</li>
<li>The attacker leverages their unauthorized access to escalate privileges, compromise managed services, and potentially open firewall ports, gaining complete control over the Juju environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely compromise the Juju controller. The attacker can read and modify all information within the Juju database, including user credentials, application configurations, and system settings. This can lead to the compromise of all applications and services managed by the Juju controller.  Privilege escalation allows the attacker to gain administrative control over the Juju environment. The ability to open firewall ports provides a pathway for lateral movement and further exploitation of the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Juju controllers to versions 3.6.20 or 4.0.5 to apply the patches that address this vulnerability.</li>
<li>Implement restrictive firewall rules to limit access to port 17666 on Juju controllers, as recommended in the advisory. Ensure only other controller IP addresses can connect to this port.</li>
<li>Deploy the following Sigma rule to detect unauthorized connections to the Dqlite database (see Sigma rule below).</li>
<li>Monitor network connections to port 17666 for unexpected source IP addresses (see IOCs).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>juju</category><category>dqlite</category><category>tls</category><category>vulnerability</category></item></channel></rss>