CVE-2026-3548
- EPSS 0.02%
- Veröffentlicht 19.03.2026 17:45:16
- Zuletzt bearbeitet 20.03.2026 13:39:46
Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized...
- EPSS 0.01%
- Veröffentlicht 19.03.2026 17:25:42
- Zuletzt bearbeitet 20.03.2026 13:39:46
A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, al...
CVE-2026-2645
- EPSS 0.03%
- Veröffentlicht 19.03.2026 17:10:22
- Zuletzt bearbeitet 20.03.2026 13:39:46
In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This issue affects wolfSS...
CVE-2026-1005
- EPSS 0.08%
- Veröffentlicht 19.03.2026 17:00:10
- Zuletzt bearbeitet 20.03.2026 13:39:46
Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. ...
CVE-2026-0819
- EPSS 0.02%
- Veröffentlicht 19.03.2026 16:54:33
- Zuletzt bearbeitet 20.03.2026 13:39:46
A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encoding functionality. In wc_PKCS7_BuildSignedAttributes(), when adding custom signed attributes, the code passes an incorrect capacity value (esd->signedAttribsCount) to Enc...
- EPSS 0.02%
- Veröffentlicht 11.12.2025 17:09:59
- Zuletzt bearbeitet 12.12.2025 15:18:13
Multiple constant-time implementations in wolfSSL before version 5.8.4 may be transformed into non-constant-time binary by LLVM optimizations, which can potentially result in observable timing discrepancies and lead to information disclosure through ...
CVE-2025-11932
- EPSS 0.01%
- Veröffentlicht 21.11.2025 23:15:44
- Zuletzt bearbeitet 04.12.2025 16:09:31
The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder
CVE-2025-12889
- EPSS 0.02%
- Veröffentlicht 21.11.2025 23:06:59
- Zuletzt bearbeitet 04.12.2025 15:43:04
With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest.
CVE-2025-11931
- EPSS 0.02%
- Veröffentlicht 21.11.2025 22:57:32
- Zuletzt bearbeitet 04.12.2025 16:21:09
Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an applicatio...
CVE-2025-12888
- EPSS 0.02%
- Veröffentlicht 21.11.2025 22:50:30
- Zuletzt bearbeitet 04.12.2025 16:07:14
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommend...