An issue was discovered in Mbed TLS before 2.28.1 and 3.x before 3.2.0. In some configurations, an unauthenticated attacker can send an invalid ClientHello message to a DTLS server that causes a heap-based buffer over-read of up to 255 bytes. This can cause a server crash or possibly information disclosure based on error responses. Affected configurations have MBEDTLSSSLDTLSCLIENTPORTREUSE enabled and MBEDTLSSSLINCONTENTLEN less than a threshold that depends on the configuration: 258 bytes if using mbedtlssslcookiecheck, and possibly up to 571 bytes with a custom cookie check function.
{
"sources": [
{
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-35409",
"published": "2022-07-15T14:15:09.840Z",
"modified": "2024-11-21T07:11:07.183Z",
"imported": "2025-11-20T23:04:02.017Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35409",
"id": "CVE-2022-35409"
}
],
"license": "CC-BY-4.0"
}