CVE-2026-3706

NameCVE-2026-3706
DescriptionA vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dropbear (PTS)bullseye2020.81-3+deb11u2vulnerable
bullseye (security)2020.81-3+deb11u3vulnerable
bookworm2022.83-1+deb12u3vulnerable
trixie (security), trixie2025.89-1~deb13u1vulnerable
forky, sid2025.89-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dropbearsource(unstable)(unfixed)

Notes

https://github.com/mkj/dropbear/issues/406
https://github.com/mkj/dropbear/pull/407

Search for package or bug name: Reporting problems