Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-2673

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expectedpreferred key exchange group when its key exchange group configuration includesthe default by using the 'DEFAULT' keyword....
Back to all
CVE

CVE-2026-2673

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expectedpreferred key exchange group when its key exchange group configuration includesthe default by using the 'DEFAULT' keyword....

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected

preferred key exchange group when its key exchange group configuration includes

the default by using the 'DEFAULT' keyword.

Impact summary: A less preferred key exchange may be used even when a more

preferred group is supported by both client and server, if the group

was not included among the client's initial predicated keyshares.

This will sometimes be the case with the new hybrid post-quantum groups,

if the client chooses to defer their use until specifically requested by

the server.

If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to

interpolate the built-in default group list into its own configuration, perhaps

adding or removing specific elements, then an implementation defect causes the

'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups

were treated as a single sufficiently secure 'tuple', with the server not

sending a Hello Retry Request (HRR) even when a group in a more preferred tuple

was mutually supported.

As a result, the client and server might fail to negotiate a mutually supported

post-quantum key agreement group, such as 'X25519MLKEM768', if the client's

configuration results in only 'classical' groups (such as 'X25519' being the

only ones in the client's initial keyshare prediction).

OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS

1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'

list of groups, and treated all the supported groups as sufficiently secure.

If any of the keyshares predicted by the client were supported by the server

the most preferred among these was selected, even if other groups supported by

the client, but not included in the list of predicted keyshares would have been

more preferred, if included.

The new syntax partitions the groups into distinct 'tuples' of roughly

equivalent security.  Within each tuple the most preferred group included among

the client's predicted keyshares is chosen, but if the client supports a group

from a more preferred tuple, but did not predict any corresponding keyshares,

the server will ask the client to retry the ClientHello (by issuing a Hello

Retry Request or HRR) with the most preferred mutually supported group.

The above works as expected when the server's configuration uses the built-in

default group list, or explicitly defines its own list by directly defining the

various desired groups and group 'tuples'.

No OpenSSL FIPS modules are affected by this issue, the code in question lies

outside the FIPS boundary.

OpenSSL 3.6 and 3.5 are vulnerable to this issue.

OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.

OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.

OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
6.5
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
C
H
U
-

Related Resources

No items found.

References

http://www.openwall.com/lists/oss-security/2026/03/13/3, https://openssl-library.org/news/secadv/20260313.txt, https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f, https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34

Severity

7.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
7.5
EPSS Probability
0.00023%
EPSS Percentile
0.06435%
Introduced Version
0
Fix Available
85977e013f32ceb96aa034c0e741adddc1a05e34,3.5.5-1~deb13u2,3.5.6-r0,1:3.5.5-1.amzn2023.0.3,3.6.2-r0,3.6.1-r3

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading