CVE-2026-26014

Publication date 13 February 2026

Last updated 13 February 2026


Ubuntu priority

Cvss 3 Severity Score

5.9 · Medium

Score breakdown

Description

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack". Upgrade to v3.1.0 or later.

Status

Package Ubuntu Release Status
golang-github-pion-dtls-v3 25.10 questing Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
golang-github-pion-dtls.v2 25.10 questing
Needs evaluation
24.04 LTS noble
Needs evaluation
22.04 LTS jammy Not in release

Severity score breakdown

Parameter Value
Base score 5.9 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N