๐Ÿ” CVE Alert

CVE-2026-44700

UNKNOWN 0.0

Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role handshake

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1.

CWE CWE-295
Vendor elixir-webrtc
Product ex_webrtc
Published May 14, 2026
Stay Ahead of the Next One

Get instant alerts for elixir-webrtc ex_webrtc

Be the first to know when new unknown vulnerabilities affecting elixir-webrtc ex_webrtc are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

elixir-webrtc / ex_webrtc
< 0.15.1 >= 0.16.0, < 0.16.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/elixir-webrtc/ex_webrtc/security/advisories/GHSA-qwfw-ggxw-577c github.com: https://github.com/elixir-webrtc/ex_webrtc/issues/249 github.com: https://github.com/elixir-webrtc/ex_webrtc/pull/250 github.com: https://github.com/elixir-webrtc/ex_webrtc/releases/tag/v0.15.1 github.com: https://github.com/elixir-webrtc/ex_webrtc/releases/tag/v0.16.1