In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-21089 | In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=575281 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2024-08-04T00:12:50.235Z
Reserved: 2021-06-09T00:00:00
Link: CVE-2021-34433

No data.

Status : Modified
Published: 2021-08-20T17:15:07.687
Modified: 2024-11-21T06:10:24.130
Link: CVE-2021-34433

No data.

No data.