CVE-2026-26014
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
11/02/2026
Last modified:
13/02/2026
Description
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.0.10 and 3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack". Upgrade to v3.0.11, v3.1.1, or later.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:pion:dtls:*:*:*:*:*:*:*:* | 3.1.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349f
- https://github.com/pion/dtls/commit/90e241cfec2985715efdd3d005972847462a67d6
- https://github.com/pion/dtls/pull/796
- https://github.com/pion/dtls/releases/tag/v3.0.11
- https://github.com/pion/dtls/releases/tag/v3.1.1
- https://github.com/pion/dtls/security/advisories/GHSA-9f3f-wv7r-qc8r



