Wolfssl

Wolfssl

89 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 19.03.2026 17:45:16
  • Zuletzt bearbeitet 20.03.2026 13:39:46

Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized...

  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 17:25:42
  • Zuletzt bearbeitet 20.03.2026 13:39:46

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, al...

  • EPSS 0.03%
  • Veröffentlicht 19.03.2026 17:10:22
  • Zuletzt bearbeitet 20.03.2026 13:39:46

In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This issue affects wolfSS...

  • EPSS 0.08%
  • Veröffentlicht 19.03.2026 17:00:10
  • Zuletzt bearbeitet 20.03.2026 13:39:46

Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. ...

  • EPSS 0.02%
  • Veröffentlicht 19.03.2026 16:54:33
  • Zuletzt bearbeitet 20.03.2026 13:39:46

A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encoding functionality. In wc_PKCS7_BuildSignedAttributes(), when adding custom signed attributes, the code passes an incorrect capacity value (esd->signedAttribsCount) to Enc...

  • EPSS 0.02%
  • Veröffentlicht 11.12.2025 17:09:59
  • Zuletzt bearbeitet 12.12.2025 15:18:13

Multiple constant-time implementations in wolfSSL before version 5.8.4 may be transformed into non-constant-time binary by LLVM optimizations, which can potentially result in observable timing discrepancies and lead to information disclosure through ...

  • EPSS 0.01%
  • Veröffentlicht 21.11.2025 23:15:44
  • Zuletzt bearbeitet 04.12.2025 16:09:31

The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder

  • EPSS 0.02%
  • Veröffentlicht 21.11.2025 23:06:59
  • Zuletzt bearbeitet 04.12.2025 15:43:04

With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest.

  • EPSS 0.02%
  • Veröffentlicht 21.11.2025 22:57:32
  • Zuletzt bearbeitet 04.12.2025 16:21:09

Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an applicatio...

  • EPSS 0.02%
  • Veröffentlicht 21.11.2025 22:50:30
  • Zuletzt bearbeitet 04.12.2025 16:07:14

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommend...