Dissecting and Exploiting Mongoose's Built-in TLS Library

This white paper investigates the built-in TLS (Transport Layer Security) stack of the Mongoose Web Server Library—a lightweight but widely used solution for secure communications. By leveraging advanced fuzz-testing methodologies, including state-of-the-art tools like AFL++, Nozomi Networks Labs tackled the challenges posed by a complex, stateful protocol and uncovered ten critical vulnerabilities. These flaws allow a remote attacker to send a carefully crafted TLS packet that can crash devices or make them completely unresponsive.

This research was presented at No Hat in October 2025.

View Resource

Speakers

Dissecting and Exploiting Mongoose's Built-in TLS Library
White Papers

Dissecting and Exploiting Mongoose's Built-in TLS Library

October 18, 2025

This white paper investigates the built-in TLS (Transport Layer Security) stack of the Mongoose Web Server Library—a lightweight but widely used solution for secure communications. By leveraging advanced fuzz-testing methodologies, including state-of-the-art tools like AFL++, Nozomi Networks Labs tackled the challenges posed by a complex, stateful protocol and uncovered ten critical vulnerabilities. These flaws allow a remote attacker to send a carefully crafted TLS packet that can crash devices or make them completely unresponsive.

This research was presented at No Hat in October 2025.

This white paper investigates the built-in TLS (Transport Layer Security) stack of the Mongoose Web Server Library—a lightweight but widely used solution for secure communications. By leveraging advanced fuzz-testing methodologies, including state-of-the-art tools like AFL++, Nozomi Networks Labs tackled the challenges posed by a complex, stateful protocol and uncovered ten critical vulnerabilities. These flaws allow a remote attacker to send a carefully crafted TLS packet that can crash devices or make them completely unresponsive.

This research was presented at No Hat in October 2025.

SPEAKERS

This white paper investigates the built-in TLS (Transport Layer Security) stack of the Mongoose Web Server Library—a lightweight but widely used solution for secure communications. By leveraging advanced fuzz-testing methodologies, including state-of-the-art tools like AFL++, Nozomi Networks Labs tackled the challenges posed by a complex, stateful protocol and uncovered ten critical vulnerabilities. These flaws allow a remote attacker to send a carefully crafted TLS packet that can crash devices or make them completely unresponsive.

This research was presented at No Hat in October 2025.

FEATURING
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

Dissecting and Exploiting Mongoose's Built-in TLS Library

This white paper investigates the built-in TLS (Transport Layer Security) stack of the Mongoose Web Server Library—a lightweight but widely used solution for secure communications. By leveraging advanced fuzz-testing methodologies, including state-of-the-art tools like AFL++, Nozomi Networks Labs tackled the challenges posed by a complex, stateful protocol and uncovered ten critical vulnerabilities. These flaws allow a remote attacker to send a carefully crafted TLS packet that can crash devices or make them completely unresponsive.

This research was presented at No Hat in October 2025.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.