CVE-2025-11936
- EPSS 0.04%
- Veröffentlicht 21.11.2025 22:24:27
- Zuletzt bearbeitet 03.12.2025 18:47:25
Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry v...
CVE-2025-11933
- EPSS 0.06%
- Veröffentlicht 21.11.2025 22:19:08
- Zuletzt bearbeitet 03.12.2025 18:47:07
Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS e...
CVE-2025-11935
- EPSS 0.01%
- Veröffentlicht 21.11.2025 22:16:18
- Zuletzt bearbeitet 03.12.2025 18:47:32
With TLS 1.3 pre-shared key (PSK) a malicious or faulty server could ignore the request for PFS (perfect forward secrecy) and the client would continue on with the connection using PSK without PFS. This happened when a server responded to a ClientHel...
CVE-2025-11934
- EPSS 0.02%
- Veröffentlicht 21.11.2025 22:12:37
- Zuletzt bearbeitet 03.12.2025 18:47:17
Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the suppo...
CVE-2025-7396
- EPSS 0.03%
- Veröffentlicht 18.07.2025 22:51:18
- Zuletzt bearbeitet 03.12.2025 15:25:26
In wolfSSL release 5.8.2 blinding support is turned on by default for Curve25519 in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel ...
CVE-2025-7394
- EPSS 0.05%
- Veröffentlicht 18.07.2025 22:34:23
- Zuletzt bearbeitet 03.12.2025 15:21:28
In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable rando...
CVE-2025-7395
- EPSS 0.04%
- Veröffentlicht 18.07.2025 22:15:59
- Zuletzt bearbeitet 22.07.2025 13:06:07
A certificate verification error in wolfSSL when building with the WOLFSSL_SYS_CA_CERTS and WOLFSSL_APPLE_NATIVE_CERT_VALIDATION options results in the wolfSSL client failing to properly verify the server certificate's domain name, allowing any cer...
CVE-2024-2881
- EPSS 0.41%
- Veröffentlicht 30.08.2024 00:15:04
- Zuletzt bearbeitet 04.09.2024 14:27:24
Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate ...
CVE-2024-1545
- EPSS 0.23%
- Veröffentlicht 29.08.2024 23:15:10
- Zuletzt bearbeitet 27.01.2026 22:15:51
Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate pri...
CVE-2024-1543
- EPSS 0.04%
- Veröffentlicht 29.08.2024 23:15:10
- Zuletzt bearbeitet 04.09.2024 14:26:29
The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line...