Cyber Posture

CVE-2026-2673

High

Published: 13 March 2026

Published
13 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 4.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2673 is a high-severity Algorithm Downgrade (CWE-757) vulnerability in Openssl Library (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1562.010 Downgrade Attack Stealth
Adversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support updated security controls.
T1600 Weaken Encryption Defense Impairment
Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications.
Why these techniques?

Remote network exploitation of TLS server software enables T1190; the handshake flaw directly facilitates downgrade to weaker classical groups (T1562.010) and weakens encryption strength (T1600).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be…

more

used even when a more preferred group is supported by both client and server, if the group was not included among the client's initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to interpolate the built-in default group list into its own configuration, perhaps adding or removing specific elements, then an implementation defect causes the 'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups were treated as a single sufficiently secure 'tuple', with the server not sending a Hello Retry Request (HRR) even when a group in a more preferred tuple was mutually supported. As a result, the client and server might fail to negotiate a mutually supported post-quantum key agreement group, such as 'X25519MLKEM768', if the client's configuration results in only 'classical' groups (such as 'X25519' being the only ones in the client's initial keyshare prediction). OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS 1.3 key agreement group on TLS servers. The old syntax had a single 'flat' list of groups, and treated all the supported groups as sufficiently secure. If any of the keyshares predicted by the client were supported by the server the most preferred among these was selected, even if other groups supported by the client, but not included in the list of predicted keyshares would have been more preferred, if included. The new syntax partitions the groups into distinct 'tuples' of roughly equivalent security. Within each tuple the most preferred group included among the client's predicted keyshares is chosen, but if the client supports a group from a more preferred tuple, but did not predict any corresponding keyshares, the server will ask the client to retry the ClientHello (by issuing a Hello Retry Request or HRR) with the most preferred mutually supported group. The above works as expected when the server's configuration uses the built-in default group list, or explicitly defines its own list by directly defining the various desired groups and group 'tuples'. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary. OpenSSL 3.6 and 3.5 are vulnerable to this issue. OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released. OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released. OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.

Deeper analysisAI

CVE-2026-2673 is a vulnerability in OpenSSL TLS 1.3 servers that causes failure to negotiate the expected preferred key exchange group when the configuration includes the 'DEFAULT' keyword to interpolate the built-in default group list. This defect results in the 'DEFAULT' list losing its 'tuple' structure, treating all server-supported groups as a single tuple and preventing the server from sending a Hello Retry Request (HRR) even when a more preferred group is mutually supported but not in the client's initial predicted keyshares. The issue affects OpenSSL versions 3.5 and 3.6; earlier versions such as 3.4, 3.3, 3.0, 1.1.1, and 1.0.2 are not vulnerable, and no OpenSSL FIPS modules are impacted.

Any remote TLS 1.3 client can trigger this issue during the handshake by providing only classical groups (e.g., X25519) in its initial keyshares, even if it supports more preferred post-quantum hybrid groups like X25519MLKEM768. Attackers require no privileges and can exploit it over the network with low complexity, leading to negotiation of a less preferred key exchange group. This results in high confidentiality impact (CVSS 3.1 score of 7.5), as the connection may use classical cryptography instead of post-quantum secure options, potentially exposing traffic to future quantum attacks.

The OpenSSL security advisory recommends upgrading OpenSSL 3.6 to version 3.6.2 and OpenSSL 3.5 to version 3.5.6 once released. Patches are available in specific commits on the OpenSSL GitHub repository, and further details are provided in the advisory at openssl-library.org/news/secadv/20260313.txt.

Details

CWE(s)

Affected Products

Openssl Library
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-32650Shared CWE-757
CVE-2025-24154Shared CWE-757

References