Impact
The vulnerability arises from insufficient protection of serialized SSL context or session data in Mbed TLS. An attacker who can alter these serialized structures can trigger memory corruption, enabling arbitrary code execution. This is a serious flaw mapped to CWE-250 and CWE-502, reflecting improper privilege handling and insecure deserialization.
Affected Systems
Arm’s Mbed TLS library is affected. All actively supported releases from 2.19.0 up to 3.6.5, and the 4.0.0 release, are vulnerable. Users of these versions should identify which exact build they run and plan an update.
Risk and Exploitability
The CVSS score is 9.8, indicating catastrophic impact. The EPSS score is below 1 % and the issue is not yet listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote, requiring an attacker to supply a tampered SSL context over the network; this can then be deserialized by the library, causing memory corruption and granting the attacker control of the process.
OpenCVE Enrichment