CVE-2026-32305: Mutual TLS Bypass via Fragmented ClientHello in Traefik
Vulnerability ID: CVE-2026-32305
CVSS Score: 7.8
Published: 2026-03-20
Traefik versions up to 2.11.40 and 3.6.10 are vulnerable to a mutual TLS (mTLS) bypass. The vulnerability occurs in the TLS Server Name Indication (SNI) pre-sniffing logic when handling fragmented ClientHello packets. This extraction failure results in the proxy falling back to a global default TLS configuration, which allows attackers to bypass route-level mTLS authentication requirements.
TL;DR
A flaw in Traefik's custom SNI pre-sniffing logic allows unauthenticated attackers to bypass route-specific mTLS requirements by transmitting a artificially fragmented TLS ClientHello message.
⚠️ Exploit Status: POC
Technical Details
- Attack Vector: Network
- CWE ID: CWE-287, CWE-1188
- CVSS v4.0: 7.8
- EPSS Score: 0.00046 (13.81%)
- Exploit Status: Proof-of-Concept Available
- KEV Status: Not Listed
Affected Systems
- Traefik v2 (<= 2.11.40)
- Traefik v3 (3.0.0-beta1 to 3.6.10)
- Traefik v3 (3.7.0-ea.1)
-
Traefik: <= 2.11.40 (Fixed in:
2.11.41) -
Traefik: >= 3.0.0-beta1, <= 3.6.10 (Fixed in:
3.6.11) -
Traefik: = 3.7.0-ea.1 (Fixed in:
3.7.0-ea.2)
Exploit Details
- tlsfuzzer Python Script: Python snippet demonstrating ClientHello fragmentation to bypass SNI extraction.
Mitigation Strategies
- Upgrade Traefik to a patched version (2.11.41, 3.6.11, or 3.7.0-ea.2).
- Configure the default TLS option to enforce mTLS globally via RequireAndVerifyClientCert.
- Explicitly configure public-facing routes with NoClientCert to invert the default fallback behavior.
- Deploy network intrusion detection rules to identify heavily fragmented TLS initial handshakes.
Remediation Steps:
- Review current Traefik deployment versions across all environments.
- Assess whether existing routing rules rely on route-specific mTLS configurations.
- Apply the patch by updating the Traefik container image tags to 2.11.41, 3.6.11, or 3.7.0-ea.2.
- If patching is delayed, update the dynamic configuration file to set the default TLS option clientAuthType to RequireAndVerifyClientCert.
- Verify access to public routes and explicitly apply permissive TLS profiles to them to prevent service disruption.
- Restart the Traefik service to apply configuration or binary updates.
References
Read the full report for CVE-2026-32305 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)