Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qwfw-ggxw-577c | ex_webrtc client-role handshake is missing DTLS peer fingerprint validation |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 15 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1. | |
| Title | Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role handshake | |
| Weaknesses | CWE-295 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T11:22:24.715Z
Reserved: 2026-05-07T17:07:09.317Z
Link: CVE-2026-44700
Updated: 2026-05-15T11:22:19.343Z
Status : Received
Published: 2026-05-14T21:16:47.907
Modified: 2026-05-14T21:16:47.907
Link: CVE-2026-44700
No data.
OpenCVE Enrichment
Updated: 2026-05-14T23:00:13Z
Github GHSA