| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qwfw-ggxw-577c | ex_webrtc client-role handshake is missing DTLS peer fingerprint validation |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elixir-webrtc
Elixir-webrtc ex Webrtc |
|
| Vendors & Products |
Elixir-webrtc
Elixir-webrtc ex Webrtc |
Fri, 15 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1. | |
| Title | Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role handshake | |
| Weaknesses | CWE-295 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T11:22:24.715Z
Reserved: 2026-05-07T17:07:09.317Z
Link: CVE-2026-44700
Updated: 2026-05-15T11:22:19.343Z
Status : Deferred
Published: 2026-05-14T21:16:47.907
Modified: 2026-05-15T14:53:48.823
Link: CVE-2026-44700
No data.
OpenCVE Enrichment
Updated: 2026-05-17T17:01:55Z
Github GHSA