PT-2026-7719 · Pion Dtls · Pion Dtls
Theodorsm
·
Published
2026-02-11
·
Updated
2026-03-03
·
CVE-2026-26014
CVSS v3.1
9.1
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
Name of the Vulnerable Software and Affected Versions
Pion DTLS versions 1.0.0 through 3.1.0
Description
Pion DTLS, a Go implementation of Datagram Transport Layer Security, is susceptible to an issue where the use of random nonce generation with AES GCM ciphers allows remote attackers to potentially obtain the authentication key and spoof data. This is possible due to nonce reuse in a session and a “forbidden attack”.
Recommendations
Upgrade to version 3.1.0 or later. This version includes a fix that uses the 64-bit sequence number to populate the
nonce explicit part of the GCM nonce. There are no workarounds without upgrading to version 3.1.0 or later.Exploit
Fix
Information Disclosure
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Pion Dtls