Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-26994
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-20 Feb, 2026 | 03:16
Updated At-20 Feb, 2026 | 19:20

uTLS is a fork of crypto/tls, created to customize ClientHello for fingerprinting resistance while still using it for the handshake. In versions 1.6.7 and below, uTLS did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a uTLS ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a uTLS client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because uTLS did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint uTLS connections. This issue has been fixed in version 1.7.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CPE Matches

refraction-networking
refraction-networking
>>utls>>Versions before 1.7.0(exclusive)
cpe:2.3:a:refraction-networking:utls:*:*:*:*:*:go:*:*
Weaknesses
CWE IDTypeSource
CWE-693Primarysecurity-advisories@github.com
CWE ID: CWE-693
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/refraction-networking/utls/commit/f8892761e2a4d29054264651d3a86fda83bc83f9security-advisories@github.com
Patch
https://github.com/refraction-networking/utls/issues/181security-advisories@github.com
Issue Tracking
https://github.com/refraction-networking/utls/pull/337security-advisories@github.com
Issue Tracking
Patch
https://github.com/refraction-networking/utls/security/advisories/GHSA-pmc3-p9hx-jq96security-advisories@github.com
Patch
Vendor Advisory
Hyperlink: https://github.com/refraction-networking/utls/commit/f8892761e2a4d29054264651d3a86fda83bc83f9
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/refraction-networking/utls/issues/181
Source: security-advisories@github.com
Resource:
Issue Tracking
Hyperlink: https://github.com/refraction-networking/utls/pull/337
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/refraction-networking/utls/security/advisories/GHSA-pmc3-p9hx-jq96
Source: security-advisories@github.com
Resource:
Patch
Vendor Advisory
Change History
0Changes found

Details not found