CVE-2022-25638Improper Certificate Validation in Wolfssl

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 65.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 24
Latest updateFeb 24

Description

In wolfSSL before 5.2.0, certificate validation may be bypassed during attempted authentication by a TLS 1.3 client to a TLS 1.3 server. This occurs when the sig_algo field differs between the certificate_verify message and the certificate message.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/wolfssl< wolfssl 5.2.0-1 (bookworm)
NVDwolfssl/wolfssl< 5.2.0
Debianwolfssl/wolfssl< 4.6.0+p1-0+deb11u1+3

Patches

🔴Vulnerability Details

3
GHSA
ImageMagick has memory leak in msl encoder2026-02-24
GHSA
GHSA-xxrj-j9r7-g9q6: In wolfSSL before 52022-02-25
OSV
CVE-2022-25638: In wolfSSL before 52022-02-24

📋Vendor Advisories

2
Oracle
Oracle Oracle Communications Risk Matrix: CNC Console (hibernate-core) — CVE-2020-256382022-04-15
Debian
CVE-2022-25638: wolfssl - In wolfSSL before 5.2.0, certificate validation may be bypassed during attempted...2022

🕵️Threat Intelligence

2
Trailofbits
Keeping the wolves out of wolfSSL2023-01-12
Trailofbits
Keeping the wolves out of wolfSSL2023-01-12
CVE-2022-25638 — Improper Certificate Validation | cvebase