Description
A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This issue affects the function mg_aes_gcm_decrypt of the file /src/tls_aes128.c of the component GCM Authentication Tag Handler. Such manipulation leads to improper verification of cryptographic signature. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.21 is capable of addressing this issue. It is advisable to upgrade the affected component. VulDB has contacted the vendor early and they confirmed quickly, that this issue got fixed already.
Problem types
Improper Verification of Cryptographic Signature
Insufficient Verification of Data Authenticity
Product status
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8
7.9
7.10
7.11
7.12
7.13
7.14
7.15
7.16
7.17
7.18
7.19
7.20
7.21
Timeline
| 2026-04-24: | Advisory disclosed |
| 2026-04-24: | VulDB entry created |
| 2026-04-24: | VulDB entry last update |
Credits
dwbruijn (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/359529 (VDB-359529 | Cesanta Mongoose GCM Authentication Tag tls_aes128.c mg_aes_gcm_decrypt signature verification)
vuldb.com/vuln/359529/cti (VDB-359529 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/796231 (Submit #796231 | Cesanta Mongoose 7.20 Improper Verification of Cryptographic Signature)
github.com/dwBruijn/CVEs/blob/main/Mongoose/AESGCM.md
github.com/cesanta/mongoose/releases/tag/7.21