Home

Description

Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-14 | Updated 2026-05-15 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-295: Improper Certificate Validation

Product status

< 0.15.1
affected

>= 0.16.0, < 0.16.1
affected

References

github.com/...webrtc/security/advisories/GHSA-qwfw-ggxw-577c

github.com/elixir-webrtc/ex_webrtc/issues/249

github.com/elixir-webrtc/ex_webrtc/pull/250

github.com/elixir-webrtc/ex_webrtc/releases/tag/v0.15.1

github.com/elixir-webrtc/ex_webrtc/releases/tag/v0.16.1

cve.org (CVE-2026-44700)

nvd.nist.gov (CVE-2026-44700)

Download JSON