CVE-2026-1677 PUBLISHED

net: TLS 1.2 connections allowed on TLS 1.3 sockets

Assigner: zephyr
Reserved: 30.01.2026 Published: 11.05.2026 Updated: 11.05.2026

Zephyr sockets created with IPPROTO_TLS_1_3 can still negotiate a TLS 1.2 connection when both TLS versions are enabled in Kconfig, because the socket-level protocol selection is not propagated to mbedTLS (e.g. via mbedtls_ssl_conf_min_tls_version). The ClientHello advertises both versions and the peer can establish TLS 1.2, so applications that assumed IPPROTO_TLS_1_3 enforces TLS 1.3 may silently use TLS 1.2 and remain exposed to TLS 1.2-specific weaknesses. As a workaround, the TLS_CIPHERSUITE_LIST socket option can be restricted to TLS 1.3-only cipher suites.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 5.3

Product Status

Vendor zephyrproject-rtos
Product Zephyr
Versions Default: unaffected
  • affected from * to 4.3 (incl.)

References

Problem Types

  • Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') CWE