Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 are vulnerable to mTLS bypass through the TLS SNI pre-sniffing logic related to fragmented ClientHello packets. When a TLS ClientHello is fragmented across multiple records, Traefik's SNI extraction may fail with an EOF and return an empty SNI. The TCP router then falls back to the default TLS configuration, which does not require client certificates by default. This allows an attacker to bypass route-level mTLS enforcement and access services that should require mutual TLS authentication. This issue is patched in versions 2.11.41, 3.6.11 and 3.7.0-ea.2. | |
| Title | Traefik mTLS bypass via fragmented ClientHello SNI extraction failure | |
| Weaknesses | CWE-1188 CWE-287 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T13:45:04.503Z
Reserved: 2026-03-11T21:16:21.659Z
Link: CVE-2026-32305
Updated: 2026-03-20T13:44:59.946Z
Status : Awaiting Analysis
Published: 2026-03-20T11:18:02.360
Modified: 2026-03-20T13:37:50.737
Link: CVE-2026-32305
No data.
OpenCVE Enrichment
Updated: 2026-03-20T14:13:49Z