mTLS Bypass Vulnerability in Traefik HTTP Reverse Proxy and Load Balancer
CVE-2026-32305
What is CVE-2026-32305?
The mTLS bypass vulnerability in Traefik arises from its handling of fragmented ClientHello packets. When packets are split, Traefik may fail to extract the SNI, leading to a default TLS configuration that doesn't enforce mutual TLS authentication. Consequently, attackers can exploit this vulnerability to access services intended to be protected by client certificate verification. This issue has been addressed in the latest versions, ensuring enhanced security and integrity of the traffic routing.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
traefik < 2.11.41 < 2.11.41
traefik >= 3.0.0-beta1, < 3.6.11 < 3.0.0-beta1, 3.6.11
traefik >= 3.7.0-ea.1, < 3.7.0-ea.2 < 3.7.0-ea.1, 3.7.0-ea.2
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
