{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2026-26014","title":"Title"},{"category":"description","text":"Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 through v3.0.10 and 3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack\". Upgrade to v3.0.11, v3.1.1, or later.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2026-26014","url":"https://www.suse.com/security/cve/CVE-2026-26014"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"Advisory link for SUSE-SU-2026:0757-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024527.html"}],"title":"SUSE CVE CVE-2026-26014","tracking":{"current_release_date":"2026-03-04T00:26:30Z","generator":{"date":"2026-03-04T00:26:30Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2026-26014","initial_release_date":"2026-03-04T00:26:30Z","revision_history":[{"date":"2026-03-04T00:26:30Z","number":"2","summary":"references added,severity changed from  to moderate"}],"status":"interim","version":"2"}}}