CVE-2026-4159
- EPSS 0.01%
- Veröffentlicht 19.03.2026 21:17:46
- Zuletzt bearbeitet 20.03.2026 13:37:50
1-byte OOB heap read in wc_PKCS7_DecodeEnvelopedData via zero-length encrypted content. A vulnerability existed in wolfSSL 5.8.4 and earlier, where a 1-byte out-of-bounds heap read in wc_PKCS7_DecodeEnvelopedData could be triggered by a crafted CMS E...
CVE-2026-3230
- EPSS 0.09%
- Veröffentlicht 19.03.2026 21:17:12
- Zuletzt bearbeitet 20.03.2026 13:39:46
Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message...
CVE-2026-3229
- EPSS 0.01%
- Veröffentlicht 19.03.2026 21:17:12
- Zuletzt bearbeitet 20.03.2026 13:39:46
An integer overflow vulnerability existed in the static function wolfssl_add_to_chain, that caused heap corruption when certificate data was written out of bounds of an insufficiently sized certificate buffer. wolfssl_add_to_chain is called by these ...
CVE-2026-4395
- EPSS 0.18%
- Veröffentlicht 19.03.2026 20:41:55
- Zuletzt bearbeitet 20.03.2026 13:39:46
Heap-based buffer overflow in the KCAPI ECC code path of wc_ecc_import_x963_ex() in wolfSSL wolfcrypt allows a remote attacker to write attacker-controlled data past the bounds of the pubkey_raw buffer via a crafted oversized EC public key point. The...
CVE-2026-3849
- EPSS 0.29%
- Veröffentlicht 19.03.2026 20:29:30
- Zuletzt bearbeitet 20.03.2026 13:39:46
Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, lea...
CVE-2026-3547
- EPSS 0.04%
- Veröffentlicht 19.03.2026 20:20:42
- Zuletzt bearbeitet 20.03.2026 13:39:46
Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of...
CVE-2026-3549
- EPSS 0.05%
- Veröffentlicht 19.03.2026 20:09:27
- Zuletzt bearbeitet 20.03.2026 13:39:46
Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and t...
CVE-2026-3580
- EPSS 0.01%
- Veröffentlicht 19.03.2026 19:46:58
- Zuletzt bearbeitet 20.03.2026 13:39:46
In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, po...
CVE-2026-3579
- EPSS 0.01%
- Veröffentlicht 19.03.2026 19:37:23
- Zuletzt bearbeitet 20.03.2026 13:39:46
wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operand values. This affects multiple SP math functions ...
CVE-2026-3503
- EPSS 0.02%
- Veröffentlicht 19.03.2026 18:12:26
- Zuletzt bearbeitet 20.03.2026 13:39:46
Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults th...