uTLS has a fingerprint vulnerability from GREASE ECH mismatch for Chrome parrots
Low severity
GitHub Reviewed
Published
Feb 17, 2026
in
refraction-networking/utls
•
Updated Feb 27, 2026
Package
Affected versions
>= 1.6.0, < 1.8.1
Patched versions
1.8.1
Description
Published to the GitHub Advisory Database
Feb 18, 2026
Reviewed
Feb 18, 2026
Published by the National Vulnerability Database
Feb 20, 2026
Last updated
Feb 27, 2026
There is a fingerprint mismatch with Chrome when using GREASE ECH, having to do with ciphersuite selection. When Chrome selects the preferred ciphersuite in the outer ClientHello and the ciphersuite for ECH, it does so consistently based on hardware support. That means, for example, if it prefers AES for the outer ciphersuite, it would also use AES for ECH. The Chrome parrot in utls hardcodes AES preference for outer ciphersuites but selects the ECH ciphersuite randomly between AES and ChaCha20. So there is a 50% chance of selecting ChaCha20 for ECH while using AES for the outer ciphersuite, which is impossible in Chrome.
This is only a problem in GREASE ECH, since in real ECH Chrome selects the first valid ciphersuite when AES is preferred, which is the same in utls. So no change is done there.
Affected symbols:
HelloChrome_120,HelloChrome_120_PQ,HelloChrome_131,HelloChrome_133Fix commit: 24bd1e05a788c1add7f3037f4532ea552b2cee07
Thanks to telegram @acgdaily for reporting this issue.
References