Vulnerability Description
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.0.10 and 3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack". Upgrade to v3.0.11, v3.1.1, or later.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pion | Dtls | < 3.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349fPatch
- https://github.com/pion/dtls/commit/90e241cfec2985715efdd3d005972847462a67d6Patch
- https://github.com/pion/dtls/pull/796Issue Tracking
- https://github.com/pion/dtls/releases/tag/v3.0.11Release Notes
- https://github.com/pion/dtls/releases/tag/v3.1.1Release Notes
- https://github.com/pion/dtls/security/advisories/GHSA-9f3f-wv7r-qc8rPatchVendor Advisory
FAQ
What is CVE-2026-26014?
CVE-2026-26014 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.0.10 and 3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for r...
How severe is CVE-2026-26014?
CVE-2026-26014 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-26014?
Check the references section above for vendor advisories and patch information. Affected products include: Pion Dtls.