๐Ÿ” CVE Alert

CVE-2026-6986

LOW 3.7

Cesanta Mongoose GCM Authentication Tag tls_aes128.c mg_aes_gcm_decrypt signature verification

CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
0th

A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This issue affects the function mg_aes_gcm_decrypt of the file /src/tls_aes128.c of the component GCM Authentication Tag Handler. Such manipulation leads to improper verification of cryptographic signature. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.21 is capable of addressing this issue. It is advisable to upgrade the affected component. VulDB has contacted the vendor early and they confirmed quickly, that this issue got fixed already.

CWE CWE-347 CWE-345
Vendor cesanta
Product mongoose
Published Apr 25, 2026
Stay Ahead of the Next One

Get instant alerts for cesanta mongoose

Be the first to know when new low vulnerabilities affecting cesanta mongoose are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Cesanta / Mongoose
7.0 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 7.11 7.12 7.13 7.14 7.15 7.16 7.17 7.18 7.19 7.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359529 vuldb.com: https://vuldb.com/vuln/359529/cti vuldb.com: https://vuldb.com/submit/796231 github.com: https://github.com/dwBruijn/CVEs/blob/main/Mongoose/AESGCM.md github.com: https://github.com/cesanta/mongoose/releases/tag/7.21

Credits

๐Ÿ” dwbruijn (VulDB User) VulDB CNA Team