Impact
Pion DTLS uses random nonce generation with AES GCM ciphers; when a nonce is reused, the authentication key can be extracted, letting a remote attacker impersonate a peer and inject forged data. This weakness compromises both confidentiality of the key material and integrity of the communication channel, allowing attackers to spoof packets and potentially bypass application‑level authentication.
Affected Systems
The vulnerability affects pion:dtls versions v1.0.0 through v3.0.10 and v3.1.0. The issue was resolved in releases v3.0.11 and v3.1.1, and in any later version of the library.
Risk and Exploitability
The CVSS base score of 5.9 marks it as moderate severity, while the EPSS score of less than 1% indicates a very low exploitation probability at the time of analysis. The vulnerability is not listed in CISA’s KEV catalog. The implied attack vector is remote network access—an attacker can trigger the flaw by sending crafted DTLS traffic to a vulnerable process. No explicit authentication or privileged access is required, so the potential impact is widespread among systems that use the affected DTLS library.
OpenCVE Enrichment
Github GHSA