Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1.

Project Subscriptions

No data.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qwfw-ggxw-577c ex_webrtc client-role handshake is missing DTLS peer fingerprint validation
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 14 May 2026 21:15:00 +0000

Type Values Removed Values Added
Description Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1.
Title Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role handshake
Weaknesses CWE-295
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T20:51:03.877Z

Reserved: 2026-05-07T17:07:09.317Z

Link: CVE-2026-44700

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-14T21:16:47.907

Modified: 2026-05-14T21:16:47.907

Link: CVE-2026-44700

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses