The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32884

CVE-2026-32884: Botan C++ Authentication Bypass Vulnerability

CVE-2026-32884 is an authentication bypass flaw in Botan C++ cryptography library affecting X.509 certificate validation. Attackers can bypass DNS name constraints using mixed-case CNs. This article covers technical details, affected versions, impact, and mitigation.

Published: April 2, 2026

CVE-2026-32884 Overview

CVE-2026-32884 is a certificate validation bypass vulnerability in the Botan C++ cryptography library. Prior to version 3.11.0, during processing of an X.509 certificate path using name constraints which restrict the set of allowable DNS names, if no subject alternative name is defined in the end-entity certificate, Botan would check that the CN was allowed by the DNS name constraints. However, this check failed to account for the possibility of a mixed-case CN, allowing certificates with mixed-case Common Names to bypass excludedSubtrees constraints due to a case-sensitive comparison.

Critical Impact

Attackers can bypass X.509 name constraint validation by using mixed-case Common Names, potentially enabling man-in-the-middle attacks or certificate forgery for restricted domains.

Affected Products

  • Botan C++ cryptography library versions prior to 3.11.0

Discovery Timeline

  • 2026-03-30 - CVE CVE-2026-32884 published to NVD
  • 2026-04-01 - Last updated in NVD database

Technical Details for CVE-2026-32884

Vulnerability Analysis

This vulnerability affects the X.509 certificate path validation functionality within the Botan cryptography library. When processing certificate chains that include name constraints (specifically excludedSubtrees restrictions for DNS names), Botan performs validation to ensure end-entity certificates comply with these constraints.

The issue arises when an end-entity certificate lacks a Subject Alternative Name (SAN) extension. In this scenario, Botan falls back to checking the Common Name (CN) field against the DNS name constraints. While RFC 5280 does not technically require this check, Botan implements it as an additional security measure. However, the implementation uses a case-sensitive string comparison rather than a case-insensitive comparison as required for DNS name matching.

This means a certificate with CN=Sub.EVIL.COM (mixed case) and no subject alternative name would bypass an excludedSubtrees constraint for evil.com because the comparison treats EVIL.COM and evil.com as different strings.

Root Cause

The root cause is improper certificate validation (CWE-295) due to case-sensitive string comparison when validating DNS name constraints against Common Name values. DNS names are inherently case-insensitive according to RFC 1035, but the Botan library was performing case-sensitive comparisons when checking CN values against excludedSubtrees name constraints.

Attack Vector

The attack vector is network-based. An attacker who can obtain or create a certificate with a mixed-case Common Name from a subordinate Certificate Authority could bypass name constraint restrictions. For example:

  1. An organization uses an intermediate CA with excludedSubtrees constraints to prevent issuance of certificates for evil.com
  2. An attacker obtains a certificate with CN=target.EVIL.COM (no SAN extension)
  3. The case-sensitive comparison in Botan fails to match EVIL.COM against the excluded evil.com
  4. The certificate is incorrectly accepted as valid, allowing potential impersonation or man-in-the-middle attacks

The vulnerability requires specific conditions: the malicious certificate must lack a Subject Alternative Name extension and use a mixed-case Common Name that differs in case from the excluded domain.

Detection Methods for CVE-2026-32884

Indicators of Compromise

  • Certificates in use that contain mixed-case Common Names without Subject Alternative Name extensions
  • Certificate validation logs showing accepted certificates for domains that should be excluded by name constraints
  • TLS connections established with certificates that have CN values differing only in case from excluded domains

Detection Strategies

  • Audit all certificates processed by applications using Botan versions prior to 3.11.0
  • Implement additional certificate validation checks at the application layer that perform case-insensitive comparisons
  • Review TLS/SSL connection logs for anomalous certificate patterns
  • Deploy certificate transparency monitoring for domains covered by name constraints

Monitoring Recommendations

  • Monitor for certificates with Common Names but no Subject Alternative Name extensions
  • Implement logging of certificate validation decisions in applications using Botan
  • Set up alerts for certificate chain validation involving name constraints
  • Review and audit intermediate CA certificates for proper name constraint enforcement

How to Mitigate CVE-2026-32884

Immediate Actions Required

  • Upgrade Botan library to version 3.11.0 or later immediately
  • Audit existing certificate chains for potential bypass conditions
  • Review applications that rely on Botan for X.509 certificate validation
  • Consider implementing additional certificate validation at the application layer as defense-in-depth

Patch Information

This vulnerability has been addressed in Botan version 3.11.0. Organizations should upgrade to this version or later to receive the fix. For detailed patch information and release notes, refer to the GitHub Security Advisory.

Workarounds

  • Ensure all certificates include Subject Alternative Name extensions, as this code path only affects certificates without SAN
  • Implement application-level certificate validation that performs case-insensitive DNS name constraint checking
  • Consider using certificate pinning for high-security connections
  • Deploy network-level certificate inspection to detect anomalous certificates

The vulnerability manifests in the name constraint validation logic within Botan's X.509 certificate processing. For technical implementation details and the specific code changes, refer to the GitHub Security Advisory.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechBotan

  • SeverityMEDIUM

  • CVSS Score5.9

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-295
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-32883: Botan Information Disclosure Vulnerability

  • CVE-2026-32877: Botan C++ Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English