CVE-2026-27017: uTLS has a fingerprint vulnerability from GREASE ECH mismatch for Chrome parrots
There is a fingerprint mismatch with Chrome when using GREASE ECH, having to do with ciphersuite selection. When Chrome selects the preferred ciphersuite in the outer ClientHello and the ciphersuite for ECH, it does so consistently based on hardware support. That means, for example, if it prefers AES for the outer ciphersuite, it would also use AES for ECH. The Chrome parrot in utls hardcodes AES preference for outer ciphersuites but selects the ECH ciphersuite randomly between AES and ChaCha20. So there is a 50% chance of selecting ChaCha20 for ECH while using AES for the outer ciphersuite, which is impossible in Chrome.
This is only a problem in GREASE ECH, since in real ECH Chrome selects the first valid ciphersuite when AES is preferred, which is the same in utls. So no change is done there.
Affected symbols: HelloChrome_120, HelloChrome_120_PQ, HelloChrome_131, HelloChrome_133
Fix commit: 24bd1e05a788c1add7f3037f4532ea552b2cee07
Thanks to telegram @acgdaily for reporting this issue.
References
- github.com/advisories/GHSA-7m29-f4hw-g2vx
- github.com/refraction-networking/utls
- github.com/refraction-networking/utls/commit/24bd1e05a788c1add7f3037f4532ea552b2cee07
- github.com/refraction-networking/utls/releases/tag/v1.8.1
- github.com/refraction-networking/utls/security/advisories/GHSA-7m29-f4hw-g2vx
- nvd.nist.gov/vuln/detail/CVE-2026-27017
Code Behaviors & Features
Detect and mitigate CVE-2026-27017 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →