Report: CVE-2026-44700 - Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role

Report: CVE-2026-44700 - Elixir WebRTC: Missing DTLS peer fingerprint validation in ex_webrtc client-role

CVE ID :CVE-2026-44700 Published : May 14, 2026, 9:16 p.m. | 1 hour, 20 minutes ago Description :Elixir WebRTC is an Elixir implementation of the W3C WebRTC API. Prior to 0.15.1 and 0.16.1, missing DTLS peer certificate fingerprint validation in the DTLS client (active) role removes one side of WebRTC's mutual authentication. The bug is not independently exploitable for media interception in standard deployments, but enables a full man-in-the-middle attack when chained with insecure signalling or a peer with similar validation gaps. This vulnerability is fixed in 0.15.1 and 0.16.1. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
May 14, 2026