Home

Description

A TCP client can perform a TLS handshake and present the server name extension with a server name that is accepted by a server wildcard name, e.g. if the server is configured with a certificate accepting *.example.com, any XYZ.example.com where xyz is a valid name can be used.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-06 | Updated 2026-05-06 | Assigner eclipse




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L

Product status

Default status
unaffected

4.3.4 (semver)
affected

5.0.0 (semver)
affected

Credits

Jihun Kim finder

References

gitlab.eclipse.org/...ity/vulnerability-reports/-/issues/381

github.com/...vert.x/security/advisories/GHSA-3g76-f9xq-8vp6

github.com/eclipse-vertx/vert.x/pull/6102

cve.org (CVE-2026-6860)

nvd.nist.gov (CVE-2026-6860)

Download JSON