mTLS Authentication Weakness in Dragonfly from DragonflyOSS
CVE-2025-59353
What is CVE-2025-59353?
Dragonfly, an open source P2P-based file distribution and image acceleration system, has a vulnerability that allows peers to obtain valid TLS certificates for arbitrary IP addresses before version 2.1.0. The flaw lies in the Manager’s Certificate gRPC service, which fails to verify whether the requested IP address corresponds to the peer initiating the certificate request. This oversight effectively undermines mTLS authentication, leaving systems potentially exposed. Users are recommended to update to version 2.1.0 or later to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
dragonfly < 2.1.0
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
