Description
A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This issue affects the function mg_aes_gcm_decrypt of the file /src/tls_aes128.c of the component GCM Authentication Tag Handler. Such manipulation leads to improper verification of cryptographic signature. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.21 is capable of addressing this issue. It is advisable to upgrade the affected component. VulDB has contacted the vendor early and they confirmed quickly, that this issue got fixed already.
Published: 2026-04-25
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Signature verification bypass in GCM authentication tags
Action: Patch
AI Analysis

Impact

A flaw in the Cesanta Mongoose library, present up to version 7.20, allows an attacker to manipulate the GCM authentication tag verification performed by mg_aes_gcm_decrypt in src/tls_aes128.c. The failure to properly validate the cryptographic signature can lead to acceptance of tampered TLS traffic, potentially compromising confidentiality or integrity of encrypted data. The weakness is characterized by CWE‑345 and CWE‑347, indicating a lack of proper authentication checks.

Affected Systems

The vulnerability affects all installations of Cesanta Mongoose up to and including 7.20. The vendor has delivered a fix in version 7.21; therefore, any deployment using 7.20 or earlier is vulnerable, regardless of operating system or build environment.

Risk and Exploitability

The CVSS v3.1 score of 6.3 rates this as a medium severity weakness, with the EPSS score indicating a very low likelihood of exploitation (<1%). It is not listed in CISA KEV and is considered difficult to exploit, though the attack can be performed remotely and requires high procedural complexity.

Generated by OpenCVE AI on April 28, 2026 at 05:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cesanta Mongoose to version 7.21 or later, ensuring the fixed GCM authentication tag logic is in use.
  • Replace or reconfigure any dependent TLS libraries to enforce strict tag verification if the upgraded Mongoose version cannot be deployed immediately.
  • Verify that all encrypted communications now properly validate the authentication tag before processing payload data.

Generated by OpenCVE AI on April 28, 2026 at 05:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This issue affects the function mg_aes_gcm_decrypt of the file /src/tls_aes128.c of the component GCM Authentication Tag Handler. Such manipulation leads to improper verification of cryptographic signature. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.21 is capable of addressing this issue. It is advisable to upgrade the affected component. VulDB has contacted the vendor early and they confirmed quickly, that this issue got fixed already.
Title Cesanta Mongoose GCM Authentication Tag tls_aes128.c mg_aes_gcm_decrypt signature verification
First Time appeared Cesanta
Cesanta mongoose
Weaknesses CWE-345
CWE-347
CPEs cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*
Vendors & Products Cesanta
Cesanta mongoose
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Cesanta Mongoose
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:36:06.578Z

Reserved: 2026-04-24T19:12:51.609Z

Link: CVE-2026-6986

cve-icon Vulnrichment

Updated: 2026-04-27T13:36:01.348Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-25T17:16:33.700

Modified: 2026-04-29T19:00:39.740

Link: CVE-2026-6986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:45:23Z

Weaknesses