Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
References
| Link | Resource |
|---|---|
| https://github.com/Mbed-TLS/mbedtls/releases | Release Notes |
| https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Oct 2025, 15:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Mbed-TLS/mbedtls/releases - Release Notes | |
| References | () https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/ - Vendor Advisory | |
| CPE | cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:* | |
| First Time |
Arm
Arm mbed Tls |
27 Mar 2025, 16:45
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
25 Mar 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-25 06:15
Updated : 2025-10-30 15:05
NVD link : CVE-2025-27810
Mitre link : CVE-2025-27810
CVE.ORG link : CVE-2025-27810
JSON object : View
Products Affected
arm
- mbed_tls
CWE
CWE-908
Use of Uninitialized Resource
