Cryptography Library Patches Critical X.509 Wildcard Certificate Validation Flaw (CVE-2026-34073)
A critical security vulnerability in the widely used Python cryptography library has been patched, exposing a flaw in X.509 certificate validation that could undermine trust in secure connections. The bug, tracked as CVE-2026-34073, was discovered in the library's handling of name constraints when a leaf certificate contains a wildcard DNS SAN. Under specific conditions, this failure to properly apply constraints to peer names during verification could allow an attacker to bypass intended security controls, though standard Web PKI topologies are reportedly not affected.
The vulnerability was fixed in version 46.0.6 of the `cryptography` library, released on March 25, 2026. The update was part of a broader dependency bump that also included `langchain-core` and `requests`. The security issue was reported by researcher Oleh Konko (1seal), highlighting the ongoing scrutiny of foundational cryptographic components. The changelog explicitly labels the fix as addressing a **SECURITY ISSUE**, underscoring its severity.
This patch underscores the persistent risk in the software supply chain, where a single vulnerability in a core library like `cryptography` can have cascading effects across countless applications and services that depend on it for TLS/SSL and data encryption. While the immediate Web PKI is stated to be safe, the flaw's existence in a critical verification pathway places pressure on developers and organizations to rapidly update their dependencies to mitigate potential exploitation in custom or non-standard certificate trust architectures.