CVE-2026-32305 PUBLISHED

Traefik mTLS bypass via fragmented ClientHello SNI extraction failure

Assigner: GitHub_M
Reserved: 11.03.2026 Published: 20.03.2026 Updated: 20.03.2026

Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 are vulnerable to mTLS bypass through the TLS SNI pre-sniffing logic related to fragmented ClientHello packets. When a TLS ClientHello is fragmented across multiple records, Traefik's SNI extraction may fail with an EOF and return an empty SNI. The TCP router then falls back to the default TLS configuration, which does not require client certificates by default. This allows an attacker to bypass route-level mTLS enforcement and access services that should require mutual TLS authentication. This issue is patched in versions 2.11.41, 3.6.11 and 3.7.0-ea.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
CVSS Score: 7.8

Product Status

Vendor traefik
Product traefik
Versions
  • Version < 2.11.41 is affected
  • Version >= 3.0.0-beta1, < 3.6.11 is affected
  • Version >= 3.7.0-ea.1, < 3.7.0-ea.2 is affected

References

Problem Types

  • CWE-287: Improper Authentication CWE
  • CWE-1188: Insecure Default Initialization of Resource CWE