CVE-2026-5477
- EPSS 0.04%
- Veröffentlicht 10.04.2026 06:16:05
- Zuletzt bearbeitet 27.04.2026 17:51:47
An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used the guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where digest is all-zeros and t...
CVE-2026-5500
- EPSS 0.08%
- Veröffentlicht 10.04.2026 04:17:17
- Zuletzt bearbeitet 27.04.2026 18:15:22
wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to 1 byte, reducing the tag c...
CVE-2026-5501
- EPSS 0.02%
- Veröffentlicht 10.04.2026 04:17:17
- Zuletzt bearbeitet 27.04.2026 17:57:21
wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is legitimately signed by ...
CVE-2026-5466
- EPSS 0.01%
- Veröffentlicht 10.04.2026 04:17:16
- Zuletzt bearbeitet 29.04.2026 13:49:42
wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against any message for any ...
CVE-2026-5479
- EPSS 0.01%
- Veröffentlicht 10.04.2026 04:17:16
- Zuletzt bearbeitet 29.04.2026 13:45:33
In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EVP_CipherFinal (and related EVP cipher finalization functions) fails to verify the authentication tag before returning plaintext to the caller. When an application uses th...
CVE-2026-5188
- EPSS 0.04%
- Veröffentlicht 10.04.2026 04:17:15
- Zuletzt bearbeitet 29.04.2026 13:54:37
An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the internal length counter ...
CVE-2026-5460
- EPSS 0.05%
- Veröffentlicht 10.04.2026 00:16:36
- Zuletzt bearbeitet 29.04.2026 14:00:49
A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner function TLSX_KeyShare_ProcessPqcClient_ex() fr...
CVE-2026-5392
- EPSS 0.02%
- Veröffentlicht 10.04.2026 00:16:35
- Zuletzt bearbeitet 29.04.2026 14:02:43
Heap out-of-bounds read in PKCS7 parsing. A crafted PKCS7 message can trigger an OOB read on the heap. The missing bounds check is in the indefinite-length end-of-content verification loop in PKCS7_VerifySignedData().
CVE-2026-5393
- EPSS 0.05%
- Veröffentlicht 10.04.2026 00:16:35
- Zuletzt bearbeitet 29.04.2026 13:58:55
Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algorithm CertificateVerify message, an out-of-bounds read can occur on crafted input. This can only occur when --enable-experimental and --enable-dual-alg-certs is used when...
CVE-2026-5448
- EPSS 0.02%
- Veröffentlicht 10.04.2026 00:16:35
- Zuletzt bearbeitet 29.04.2026 13:56:59
X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when calling these two APIs di...