CVE-2026-34580

Source
https://cve.org/CVERecord?id=CVE-2026-34580
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-34580.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-34580
Aliases
  • GHSA-v782-6fq4-q827
Published
2026-04-07T21:12:09.604Z
Modified
2026-04-09T11:46:20.803472Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Botan has a certificate authentication bypass due to trust anchor confusion
Details

Botan is a C++ cryptography library. In 3.11.0, the function CertificateStore::certificateknown had a misleading name; it would return true if any certificate in the store had a DN (and subject key identifier, if set) matching that of the argument. It did not check that the cert it found and the cert it was passed were actually the same certificate. In 3.11.0 an extension of path validation logic was made which assumed that certificate_known only returned true if the certificates were in fact identical. The impact is that if an end entity certificate is presented, and its DN (and subject key identifier, if set) match that of any trusted root, the end entity certificate is accepted immediately as if it itself were a trusted root. , This vulnerability is fixed in 3.11.1.

Database specific
{
    "cwe_ids": [
        "CWE-295"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34580.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/randombit/botan

Affected ranges

Type
GIT
Repo
https://github.com/randombit/botan
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.11.0"
        },
        {
            "fixed": "3.11.1"
        }
    ]
}

Affected versions

3.*
3.11.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-34580.json"