Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-6860
PUBLISHED
More InfoOfficial Page
Assigner-eclipse
Assigner Org ID-e51fbebd-6053-4e49-959f-1b94eeb69a2c
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 09:55
Updated At-06 May, 2026 | 09:55
Rejected At-
▼CVE Numbering Authority (CNA)

A TCP client can perform a TLS handshake and present the server name extension with a server name that is accepted by a server wildcard name, e.g. if the server is configured with a certificate accepting *.example.com, any XYZ.example.com where xyz is a valid name can be used.

Affected Products
Vendor
Eclipse Foundation AISBLEclipse Foundation
Product
Eclipse Vert.x
Default Status
unaffected
Versions
Affected
  • From 4.3.4 through 4.5.26 (semver)
  • From 5.0.0 through 5.0.11 (semver)
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Jihun Kim
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/381
N/A
https://github.com/eclipse-vertx/vert.x/security/advisories/GHSA-3g76-f9xq-8vp6
N/A
https://github.com/eclipse-vertx/vert.x/pull/6102
N/A
Hyperlink: https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/381
Resource: N/A
Hyperlink: https://github.com/eclipse-vertx/vert.x/security/advisories/GHSA-3g76-f9xq-8vp6
Resource: N/A
Hyperlink: https://github.com/eclipse-vertx/vert.x/pull/6102
Resource: N/A
Details not found