{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:15:19.504","vulnerabilities":[{"cve":{"id":"CVE-2026-26014","sourceIdentifier":"security-advisories@github.com","published":"2026-02-11T21:16:21.257","lastModified":"2026-02-25T17:40:28.640","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.0.10 and 3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack\". Upgrade to v3.0.11, v3.1.1, or later."},{"lang":"es","value":"Pion DTLS es una implementación en Go de Datagram Transport Layer Security. Las versiones v1.0.0 a v3.0.10 y 3.1.0 de Pion DTLS usan generación de nonce aleatorio con cifrados AES GCM, lo que facilita a los atacantes remotos obtener la clave de autenticación y falsificar datos aprovechando la reutilización de un nonce en una sesión y un 'ataque prohibido'. Actualice a v3.0.11, v3.1.1, o posterior."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pion:dtls:*:*:*:*:*:*:*:*","versionEndExcluding":"3.1.0","matchCriteriaId":"637DA08C-B336-461A-88BE-F52B88D93F00"}]}]}],"references":[{"url":"https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/pion/dtls/commit/90e241cfec2985715efdd3d005972847462a67d6","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/pion/dtls/pull/796","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/pion/dtls/releases/tag/v3.0.11","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/pion/dtls/releases/tag/v3.1.1","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/pion/dtls/security/advisories/GHSA-9f3f-wv7r-qc8r","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}