CVE-2025-7396
- EPSS 0.03%
- Published 18.07.2025 22:51:18
- Last modified 22.07.2025 13:06:07
In wolfSSL release 5.8.2 blinding support is turned on by default for Curve25519 in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel ...
- EPSS 0.08%
- Published 18.07.2025 22:34:23
- Last modified 22.07.2025 13:06:07
In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable rando...
CVE-2025-7395
- EPSS 0.04%
- Published 18.07.2025 22:15:59
- Last modified 22.07.2025 13:06:07
A certificate verification error in wolfSSL when building with the WOLFSSL_SYS_CA_CERTS and WOLFSSL_APPLE_NATIVE_CERT_VALIDATION options results in the wolfSSL client failing to properly verify the server certificate's domain name, allowing any cer...
CVE-2024-2881
- EPSS 0.46%
- Published 30.08.2024 00:15:04
- Last modified 04.09.2024 14:27:24
Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate ...
CVE-2024-1545
- EPSS 0.18%
- Published 29.08.2024 23:15:10
- Last modified 04.09.2024 14:27:08
Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate pri...
CVE-2024-1543
- EPSS 0.02%
- Published 29.08.2024 23:15:10
- Last modified 04.09.2024 14:26:29
The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line...
CVE-2024-5991
- EPSS 0.13%
- Published 27.08.2024 19:15:18
- Last modified 06.09.2024 22:51:41
In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it...
CVE-2024-5814
- EPSS 0.15%
- Published 27.08.2024 19:15:17
- Last modified 28.08.2024 12:57:39
A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the ser...
CVE-2024-5288
- EPSS 0.05%
- Published 27.08.2024 19:15:17
- Last modified 20.02.2025 21:10:36
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS conn...
CVE-2024-1544
- EPSS 0.02%
- Published 27.08.2024 19:15:16
- Last modified 28.08.2024 12:57:39
Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the elliptic curve. Meaning k = r mod n. The division used during the reduction estimates a factor q_e...