CVE-2026-26014

critical

Description

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.0.10 and 3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack". Upgrade to v3.0.11, v3.1.1, or later.

References

https://github.com/pion/dtls/security/advisories/GHSA-9f3f-wv7r-qc8r

https://github.com/pion/dtls/releases/tag/v3.1.1

https://github.com/pion/dtls/releases/tag/v3.0.11

https://github.com/pion/dtls/pull/796

https://github.com/pion/dtls/commit/90e241cfec2985715efdd3d005972847462a67d6

https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349f

Details

Source: Mitre, NVD

Published: 2026-02-11

Updated: 2026-02-13

Risk Information

CVSS v2

Base Score: 9.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

Severity: High

CVSS v3

Base Score: 9.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical

EPSS

EPSS: 0.00091