CVE-2026-3832 - Gnutls: gnutls: security bypass allows acceptance of revoked server certificates via crafted ocsp response
CVE ID :CVE-2026-3832
Published : April 30, 2026, 5:41 p.m. | 33 minutes ago
Description :A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.
Severity: 3.7 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : April 30, 2026, 5:41 p.m. | 33 minutes ago
Description :A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.
Severity: 3.7 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...