Description
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
Scores
CVSS v3
7.4
EPSS
0.1149
EPSS Percentile
93.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-330
Status
published
Products (6)
canonical/ubuntu_linux
19.10
debian/debian_linux
10.0
fedoraproject/fedora
31
fedoraproject/fedora
32
gnu/gnutls
3.6.3 - 3.6.13
opensuse/leap
15.1
Published
Apr 03, 2020
Tracked Since
Feb 18, 2026