PT-2026-39574 · Zephyrproject Rtos · Zephyr

Published

2026-05-11

·

Updated

2026-05-11

·

CVE-2026-1677

CVSS v3.1

5.3

Medium

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Zephyr sockets created with IPPROTO TLS 1 3 can still negotiate a TLS 1.2 connection when both TLS versions are enabled in Kconfig, because the socket-level protocol selection is not propagated to mbedTLS (e.g. via mbedtls ssl conf min tls version). The ClientHello advertises both versions and the peer can establish TLS 1.2, so applications that assumed IPPROTO TLS 1 3 enforces TLS 1.3 may silently use TLS 1.2 and remain exposed to TLS 1.2-specific weaknesses. As a workaround, the TLS CIPHERSUITE LIST socket option can be restricted to TLS 1.3-only cipher suites.

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-1677

Affected Products

Zephyr