CVE-2026-44700 PUBLISHED

Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role handshake

Assigner: GitHub_M
Reserved: 07.05.2026 Published: 14.05.2026 Updated: 14.05.2026

Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor elixir-webrtc
Product ex_webrtc
Versions
  • Version < 0.15.1 is affected
  • Version >= 0.16.0, < 0.16.1 is affected

References

Problem Types

  • CWE-295: Improper Certificate Validation CWE