Impact
A client can send ApplicationData records before the Finished message, bypassing TLS 1.3 certificate authentication. The flaw originates from the library not validating the order of handshake messages. An attacker can therefore access services that require client certificates without presenting a valid cert, compromising confidentiality and integrity.
Affected Systems
The randomBit Botan cryptographic library versions earlier than 3.11.1 are affected. Systems that use Botan for TLS 1.3 and enforce mutual authentication are vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates significant risk. EPSS data is not available. The attack can be performed by an arbitrary client that sends premature application data, so no special conditions are required. This bypass permits unauthorized access, so the risk is high.
OpenCVE Enrichment