ctipilot.chSwitzerland · Europe · Public sector

Traefik proxy — mTLS bypass via fragmented TLS ClientHello

cve · CVE-2026-32305

Coverage timeline
1
first 2026-05-06 → last 2026-05-06
Briefs
1
1 distinct
Sources cited
1
1 hosts
Sections touched
1
active_vulns
Co-occurring entities
0
no co-occurrence

Story timeline

  1. 2026-05-06CTI Daily Brief — 2026-05-06
    active_vulnsFirst coverage. Fragmented TLS ClientHello causes SNI extraction failure, falling back to non-mTLS config; relevant to zero-trust API gateway deployments. CERT-FR CERTFR-2026-AVI-0531.

Where this entity is cited

  • active_vulns1

Source distribution

  • cert.ssi.gouv.fr1 (100%)

Items in briefs about Traefik proxy — mTLS bypass via fragmented TLS ClientHello

No parsed item heading or body matches this entity yet. Items match by exact CVE id (for CVE entities), by lead-segment substring of the title in the item heading or body, or by a distinctive anchor token from the title appearing in the item heading. Coverage that lives inside a broader section (no per-item heading) is captured by the Story timeline above.