#VU124803 Use of insufficiently random values in mbed TLS - CVE-2026-34871
Published: April 2, 2026
mbed TLS
ARM
Description
The vulnerability allows a local user to compromise cryptographic operations by causing the use of predictable random data.
The vulnerability exists due to improper fallback to /dev/urandom in entropy collection on Linux when getrandom() is unavailable or blocked. A local user can control the system state or restrict access to getrandom() to force the use of /dev/urandom during early boot, leading to insufficient entropy and predictable cryptographic outputs.
Devices without hardware random number generators are especially at risk during initial boot or OS installation. The issue affects Linux platforms where getrandom() is not available (kernel <3.17), blocked by sandboxing, or not supported by the C library.