CVE-2020-24613Improper Certificate Validation in Wolfssl

Severity
6.8MEDIUMNVD
EPSS
0.3%
top 50.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 24
Latest updateMay 24

Description

wolfSSL before 4.5.0 mishandles TLS 1.3 server data in the WAIT_CERT_CR state, within SanityCheckTls13MsgReceived() in tls13.c. This is an incorrect implementation of the TLS 1.3 client state machine. This allows attackers in a privileged network position to completely impersonate any TLS 1.3 servers, and read or modify potentially sensitive information between clients using the wolfSSL library and these TLS servers.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 1.6 | Impact: 5.2

Affected Packages3 packages

debiandebian/wolfssl< wolfssl 4.5.0+dfsg-1 (bookworm)
NVDwolfssl/wolfssl< 4.5.0
Debianwolfssl/wolfssl< 4.5.0+dfsg-1+3

🔴Vulnerability Details

2
GHSA
GHSA-m4j6-ffw6-5r4m: wolfSSL before 42022-05-24
OSV
CVE-2020-24613: wolfSSL before 42020-08-24

📋Vendor Advisories

1
Debian
CVE-2020-24613: wolfssl - wolfSSL before 4.5.0 mishandles TLS 1.3 server data in the WAIT_CERT_CR state, w...2020
CVE-2020-24613 — Improper Certificate Validation | cvebase