Cyber Posture

CVE-2026-34876

High

Published: 02 April 2026

Published
02 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0003 7.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34876 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Arm Mbed Tls. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses this CVE by requiring timely patching of vulnerable Mbed TLS versions to versions like 3.6.6 that include tag_len validation.

prevent

Information input validation requires applications to check the tag_len parameter before invoking mbedtls_ccm_finish(), mitigating oversized inputs that trigger the out-of-bounds read.

prevent

Memory protection mechanisms such as address space layout randomization and non-executable memory help contain the impact of the out-of-bounds read in the CCM context buffer.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The remotely exploitable out-of-bounds read in Mbed TLS (triggerable via multipart CCM API with no auth or interaction) directly enables exploitation of public-facing applications for high-impact data disclosure.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_len parameter. This is…

more

caused by missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer. The issue affects the public multipart CCM API in Mbed TLS 3.x, where mbedtls_ccm_finish() can be invoked directly by applications. In Mbed TLS 4.x versions prior to the fix, the same missing validation exists in the internal implementation; however, the function is not exposed as part of the public API. Exploitation requires application-level invocation of the multipart CCM API.

Deeper analysisAI

CVE-2026-34876 is an out-of-bounds read vulnerability in the mbedtls_ccm_finish() function within library/ccm.c of Mbed TLS 3.x versions before 3.6.6. The flaw arises from a missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer, allowing attackers to access adjacent CCM context data when invoking the public multipart CCM API with an oversized tag_len. The issue also exists internally in Mbed TLS 4.x versions prior to their respective fixes, though it is not exposed via the public API in those versions. Exploitation specifically requires application-level use of the multipart CCM API.

Remote attackers can exploit this vulnerability over the network with low complexity, requiring no privileges or user interaction, as indicated by its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). By supplying an oversized tag_len to mbedtls_ccm_finish(), attackers can trigger the out-of-bounds read (CWE-125), potentially disclosing sensitive adjacent data from the CCM context, leading to high confidentiality impact without affecting integrity or availability.

The Mbed TLS security advisory at https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-ccm-finish-boundary-check/ and related updates at https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ detail mitigation through upgrading to Mbed TLS 3.6.6 or later for the 3.x series, which includes validation of the tag_len parameter. Applications using the multipart CCM API should validate inputs and update libraries promptly to prevent exploitation.

Details

CWE(s)

Affected Products

arm
mbed tls
3.1.0 — 3.6.6

CVEs Like This One

CVE-2026-34877Same product: Arm Mbed Tls
CVE-2026-34873Same product: Arm Mbed Tls
CVE-2025-47917Same product: Arm Mbed Tls
CVE-2026-34875Same product: Arm Mbed Tls
CVE-2026-25833Same product: Arm Mbed Tls
CVE-2026-34874Same product: Arm Mbed Tls
CVE-2026-25835Same product: Arm Mbed Tls
CVE-2026-34872Same product: Arm Mbed Tls
CVE-2026-42799Shared CWE-125
CVE-2026-22984Shared CWE-125

References