Description
An issue was discovered in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0. A buffer overflow can occur in public key export for FFDH keys.
Published: 2026-04-01
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

A buffer overflow occurs during public key export for FFDH keys in Mbed TLS and TF‑PSA‑Crypto, allowing an attacker to execute arbitrary code. The flaw is a classic memory corruption issue (CWE‑120). If exploited, an attacker can run malicious code with the same privileges as the affected application, potentially compromising confidentiality, integrity, and availability of the device or system.

Affected Systems

ARM’s Mbed TLS versions up to and including 3.6.5, and TF‑PSA‑Crypto version 1.0.0 are vulnerable. These are commonly used on embedded devices that rely on cryptographic key generation and export functions.

Risk and Exploitability

The CVSS score of 9.8 classifies this as critical, yet the EPSS score of less than 1% suggests exploiting this bug is currently unlikely. It is not listed in the CISA KEV catalog. Based on the description, the attacker needs to trigger a key export operation—likely via an exposed API or internal process—before the overflow occurs. This inferred attack vector may allow remote exploitation if the key export function is reachable from a networked interface. The exploit would require a crafted key export request that overflows the buffer and injects code.

Generated by OpenCVE AI on April 6, 2026 at 16:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Mbed TLS patch (v3.6.6 or newer).
  • Apply the latest TF‑PSA‑Crypto patch (v1.0.1 or newer).
  • If updating is not immediately possible, restrict or disable access to the FFDH key export functionality within the application.
  • Monitor logs for unusual key export activity and perform integrity checks on critical binaries.

Generated by OpenCVE AI on April 6, 2026 at 16:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Arm
Arm mbed Tls
Arm tf-psa-crypto
CPEs cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
cpe:2.3:a:arm:tf-psa-crypto:*:*:*:*:*:*:*:*
Vendors & Products Arm
Arm mbed Tls
Arm tf-psa-crypto

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Mbed-tls
Mbed-tls mbedtls
Mbed-tls tf-psa-crypto
Vendors & Products Mbed-tls
Mbed-tls mbedtls
Mbed-tls tf-psa-crypto

Thu, 02 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title mbedtls: Mbed TLS and TF-PSA-Crypto: Arbitrary code execution due to buffer overflow in FFDH key export
References
Metrics threat_severity

None

threat_severity

Critical


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0. A buffer overflow can occur in public key export for FFDH keys.
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Arm Mbed Tls Tf-psa-crypto
Mbed-tls Mbedtls Tf-psa-crypto
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-01T18:29:02.514Z

Reserved: 2026-03-31T00:00:00.000Z

Link: CVE-2026-34875

cve-icon Vulnrichment

Updated: 2026-04-01T18:26:48.519Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T18:16:31.433

Modified: 2026-04-06T14:18:04.433

Link: CVE-2026-34875

cve-icon Redhat

Severity : Critical

Publid Date: 2026-04-01T00:00:00Z

Links: CVE-2026-34875 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:07:39Z

Weaknesses