Description
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
References (4)
Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf
Third Party Advisory x_refsource_misc
https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean
Patch, Third Party Advisory x_refsource_misc
https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0
Patch, Third Party Advisory x_refsource_misc
https://github.com/pion/dtls/compare/v1.5.1...v1.5.2
Scores
CVSS v3
9.8
EPSS
0.0122
EPSS Percentile
79.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-287
Status
published
Products (2)
pion/dtls
< 1.5.2
pion/dtls
0 - 1.5.2Go
Published
Apr 19, 2020
Tracked Since
Feb 18, 2026