In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/refraction-networking/utls
to version 1.7.0 or higher.
Affected versions of this package are vulnerable to Protection Mechanism Failure in the ClientHandshake()
function, which handles ClientHello
messages, and in particular the serverHello.random
field. An attacker can downgrade the TLS connection from TLS 1.3 by removing the SupportedVersions
extension and thereby bypass checking for a downgrade canary, which could facilitate traffic interception and MitM attacks. Protection against TLS downgrade is required as part of RFC 8446 Section 4.1.3.