CVE-2026-2673
TLS 1.3 Key Exchange Negotiation Flaw in OpenSSL
Publication date: 2026-03-13
Last updated on: 2026-03-17
Assigner: OpenSSL Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openssl | openssl | 3.5 |
| openssl | openssl | to 3.6.2 (inc) |
| openssl | openssl | to 3.5.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-757 | A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-2673 is a vulnerability in OpenSSL TLS 1.3 servers related to how the server handles key exchange group configurations when using the 'DEFAULT' keyword. The issue causes the loss of the intended 'tuple' structure of key agreement groups during configuration expansion, which means the server may treat all supported groups as a single group rather than distinct groups of roughly equivalent security."}, {'type': 'paragraph', 'content': "This flaw can cause the server to select a less preferred key exchange group even if a more preferred group is mutually supported by both client and server. It particularly affects negotiation involving new hybrid post-quantum key agreement groups, such as 'X25519MLKEM768'. If the client initially predicts only classical groups and defers post-quantum groups until requested, the server fails to issue a Hello Retry Request (HRR) to prompt the client to retry with a more preferred group."}, {'type': 'paragraph', 'content': "The vulnerability arises because the 'DEFAULT' keyword expansion loses the tuple grouping semantics, which are critical for TLS 1.3 group selection logic. The fix preserves the tuple structure during expansion, ensuring correct group preference and improving TLS handshake security and interoperability."}] [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability can impact you by causing your OpenSSL TLS 1.3 server to negotiate a less preferred or weaker key exchange group during the TLS handshake. This means that even if a stronger or more secure key agreement group is supported by both client and server, the server might not select it due to the loss of tuple structure in the configuration.
Specifically, it can prevent the negotiation of newer hybrid post-quantum key agreement groups, potentially weakening the security of the TLS connection. The server may fail to send a Hello Retry Request (HRR) to prompt the client to retry with a more secure group, leading to suboptimal security during key exchange.
This could expose communications to downgrade risks where a less secure key exchange is used, potentially making encrypted communications less resistant to future cryptographic attacks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'To mitigate the CVE-2026-2673 vulnerability, users of OpenSSL 3.6 should upgrade to OpenSSL version 3.6.2 once it is released.'}, {'type': 'paragraph', 'content': 'Users of OpenSSL 3.5 should upgrade to OpenSSL version 3.5.6 once it is released.'}, {'type': 'paragraph', 'content': 'If you are using OpenSSL versions 3.4, 3.3, 3.0, 1.1.1, or 1.0.2, you are not affected by this issue.'}, {'type': 'paragraph', 'content': "The vulnerability arises from using the 'DEFAULT' keyword in the server's TLS 1.3 key exchange group configuration, which causes loss of tuple structure and may lead to suboptimal keyshare selection."}, {'type': 'paragraph', 'content': "As an immediate step, avoid using the 'DEFAULT' keyword to interpolate the built-in default group list into custom configurations until you have applied the fixed OpenSSL versions."}] [1, 2, 3]