CVE-2026-44700
Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role handshake
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1.
| CWE | CWE-295 |
| Vendor | elixir-webrtc |
| Product | ex_webrtc |
| Published | May 14, 2026 |
Stay Ahead of the Next One
Get instant alerts for elixir-webrtc ex_webrtc
Be the first to know when new unknown vulnerabilities affecting elixir-webrtc ex_webrtc are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
elixir-webrtc / ex_webrtc
< 0.15.1 >= 0.16.0, < 0.16.1
References
github.com: https://github.com/elixir-webrtc/ex_webrtc/security/advisories/GHSA-qwfw-ggxw-577c github.com: https://github.com/elixir-webrtc/ex_webrtc/issues/249 github.com: https://github.com/elixir-webrtc/ex_webrtc/pull/250 github.com: https://github.com/elixir-webrtc/ex_webrtc/releases/tag/v0.15.1 github.com: https://github.com/elixir-webrtc/ex_webrtc/releases/tag/v0.16.1