Medium severity5.3NVD Advisory· Published May 6, 2026· Updated May 12, 2026
CVE-2026-6860
CVE-2026-6860
Description
A TCP client can perform a TLS handshake and present the server name extension with a server name that is accepted by a server wildcard name, e.g. if the server is configured with a certificate accepting *.example.com, any XYZ.example.com where xyz is a valid name can be used.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/eclipse-vertx/vert.x/pull/6102nvdIssue TrackingPatch
- gitlab.eclipse.org/security/vulnerability-reports/-/issues/381nvdExploitIssue TrackingThird Party Advisory
- github.com/advisories/GHSA-3g76-f9xq-8vp6ghsaADVISORY
- github.com/eclipse-vertx/vert.x/security/advisories/GHSA-3g76-f9xq-8vp6nvdVendor AdvisoryExploit
- nvd.nist.gov/vuln/detail/CVE-2026-6860ghsa
News mentions
0No linked articles in our index yet.