Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-6986
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-25 Apr, 2026 | 16:30
Updated At-27 Apr, 2026 | 13:36
Rejected At-
▼CVE Numbering Authority (CNA)
Cesanta Mongoose GCM Authentication Tag tls_aes128.c mg_aes_gcm_decrypt signature verification

A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This issue affects the function mg_aes_gcm_decrypt of the file /src/tls_aes128.c of the component GCM Authentication Tag Handler. Such manipulation leads to improper verification of cryptographic signature. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.21 is capable of addressing this issue. It is advisable to upgrade the affected component. VulDB has contacted the vendor early and they confirmed quickly, that this issue got fixed already.

Affected Products
Vendor
Cesanta
Product
Mongoose
CPEs
  • cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*
Modules
  • GCM Authentication Tag Handler
Versions
Affected
  • 7.0
  • 7.1
  • 7.2
  • 7.3
  • 7.4
  • 7.5
  • 7.6
  • 7.7
  • 7.8
  • 7.9
  • 7.10
  • 7.11
  • 7.12
  • 7.13
  • 7.14
  • 7.15
  • 7.16
  • 7.17
  • 7.18
  • 7.19
  • 7.20
Unaffected
  • 7.21
Problem Types
TypeCWE IDDescription
CWECWE-347Improper Verification of Cryptographic Signature
CWECWE-345Insufficient Verification of Data Authenticity
Type: CWE
CWE ID: CWE-347
Description: Improper Verification of Cryptographic Signature
Type: CWE
CWE ID: CWE-345
Description: Insufficient Verification of Data Authenticity
Metrics
VersionBase scoreBase severityVector
4.06.3MEDIUM
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
3.13.7LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
3.03.7LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
2.02.6N/A
AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C
Version: 4.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
Version: 3.1
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
Version: 3.0
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
Version: 2.0
Base score: 2.6
Base severity: N/A
Vector:
AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
dwbruijn (VulDB User)
coordinator
VulDB CNA Team
Timeline
EventDate
Advisory disclosed2026-04-24 00:00:00
VulDB entry created2026-04-24 02:00:00
VulDB entry last update2026-04-24 21:18:01
Event: Advisory disclosed
Date: 2026-04-24 00:00:00
Event: VulDB entry created
Date: 2026-04-24 02:00:00
Event: VulDB entry last update
Date: 2026-04-24 21:18:01
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/vuln/359529
vdb-entry
technical-description
https://vuldb.com/vuln/359529/cti
signature
permissions-required
https://vuldb.com/submit/796231
third-party-advisory
https://github.com/dwBruijn/CVEs/blob/main/Mongoose/AESGCM.md
exploit
https://github.com/cesanta/mongoose/releases/tag/7.21
patch
Hyperlink: https://vuldb.com/vuln/359529
Resource:
vdb-entry
technical-description
Hyperlink: https://vuldb.com/vuln/359529/cti
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/submit/796231
Resource:
third-party-advisory
Hyperlink: https://github.com/dwBruijn/CVEs/blob/main/Mongoose/AESGCM.md
Resource:
exploit
Hyperlink: https://github.com/cesanta/mongoose/releases/tag/7.21
Resource:
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found