{"id":"UBUNTU-CVE-2018-1000520","details":"ARM mbedTLS version 2.7.0 and earlier contains a Ciphersuite Allows Incorrectly Signed Certificates vulnerability in mbedtls_ssl_get_verify_result() that can result in ECDSA-signed certificates are accepted, when only RSA-signed ones should be.. This attack appear to be exploitable via Peers negotiate a TLS-ECDH-RSA-* ciphersuite. Any of the peers can then provide an ECDSA-signed certificate, when only an RSA-signed one should be accepted..","modified":"2026-03-25T18:18:18.424373Z","published":"2018-06-26T16:29:00Z","upstream":["CVE-2018-1000520"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000520"},{"type":"REPORT","url":"https://github.com/ARMmbed/mbedtls/issues/1561"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000520"}],"affected":[{"package":{"name":"mbedtls","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/mbedtls@2.2.1-2ubuntu0.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.2-1","2.2.0-1","2.2.1-1","2.2.1-2","2.2.1-2ubuntu0.1","2.2.1-2ubuntu0.2","2.2.1-2ubuntu0.3"],"ecosystem_specific":{"binaries":[{"binary_name":"libmbedcrypto0","binary_version":"2.2.1-2ubuntu0.3"},{"binary_name":"libmbedtls-dev","binary_version":"2.2.1-2ubuntu0.3"},{"binary_name":"libmbedtls10","binary_version":"2.2.1-2ubuntu0.3"},{"binary_name":"libmbedx509-0","binary_version":"2.2.1-2ubuntu0.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000520.json"}},{"package":{"name":"mbedtls","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/mbedtls@2.8.0-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.5.1-1ubuntu1","2.6.0-1","2.7.0-2","2.8.0-1","2.8.0-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmbedcrypto1","binary_version":"2.8.0-1ubuntu0.1~esm1"},{"binary_name":"libmbedtls-dev","binary_version":"2.8.0-1ubuntu0.1~esm1"},{"binary_name":"libmbedtls10","binary_version":"2.8.0-1ubuntu0.1~esm1"},{"binary_name":"libmbedx509-0","binary_version":"2.8.0-1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000520.json"}},{"package":{"name":"mbedtls","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/mbedtls@2.16.4-1ubuntu2+esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.16.2-1","2.16.3-1","2.16.4-1ubuntu2","2.16.4-1ubuntu2+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmbedcrypto3","binary_version":"2.16.4-1ubuntu2+esm1"},{"binary_name":"libmbedtls-dev","binary_version":"2.16.4-1ubuntu2+esm1"},{"binary_name":"libmbedtls12","binary_version":"2.16.4-1ubuntu2+esm1"},{"binary_name":"libmbedx509-0","binary_version":"2.16.4-1ubuntu2+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000520.json"}},{"package":{"name":"mbedtls","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/mbedtls@2.28.0-1ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.16.9-0.1ubuntu1","2.16.11-0.1ubuntu1","2.16.11-0.3","2.28.0-1","2.28.0-1build1","2.28.0-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmbedcrypto7","binary_version":"2.28.0-1ubuntu0.1~esm1"},{"binary_name":"libmbedtls-dev","binary_version":"2.28.0-1ubuntu0.1~esm1"},{"binary_name":"libmbedtls14","binary_version":"2.28.0-1ubuntu0.1~esm1"},{"binary_name":"libmbedx509-1","binary_version":"2.28.0-1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000520.json"}},{"package":{"name":"mbedtls","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/mbedtls@2.28.8-1ubuntu0.1~esm1?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.28.3-1","2.28.6-1ubuntu1","2.28.7-1ubuntu1","2.28.7-1.1ubuntu1","2.28.8-1","2.28.8-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmbedcrypto7t64","binary_version":"2.28.8-1ubuntu0.1~esm1"},{"binary_name":"libmbedtls-dev","binary_version":"2.28.8-1ubuntu0.1~esm1"},{"binary_name":"libmbedtls14t64","binary_version":"2.28.8-1ubuntu0.1~esm1"},{"binary_name":"libmbedx509-1t64","binary_version":"2.28.8-1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000520.json"}},{"package":{"name":"mbedtls","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/mbedtls@3.6.2-3ubuntu1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.2-3ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmbedcrypto16","binary_version":"3.6.2-3ubuntu1"},{"binary_name":"libmbedtls-dev","binary_version":"3.6.2-3ubuntu1"},{"binary_name":"libmbedtls21","binary_version":"3.6.2-3ubuntu1"},{"binary_name":"libmbedx509-7","binary_version":"3.6.2-3ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000520.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}]}