CVE-2023-3724Improper Input Validation in Wolfssl

Severity
8.8HIGHNVD
EPSS
0.1%
top 66.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 17
Latest updateJul 18

Description

If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing access to or meddling with message contents in the session

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages9 packages

debiandebian/wolfssl< wolfssl 5.5.4-2+deb12u1 (bookworm)
NVDwolfssl/wolfssl< 5.6.2
Debianwolfssl/wolfssl< 4.6.0+p1-0+deb11u2+3
CVEListV5wolfssl/wolfssl3.14.05.6.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h4rv-393v-2f5h: If a TLS 12023-07-18
OSV
CVE-2023-3724: If a TLS 12023-07-17

📋Vendor Advisories

4
Microsoft
TLS 1.3 client issue handling malicious server when not including a KSE and PSK extension2023-07-11
Microsoft
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the f2023-02-14
Red Hat
libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c2023-02-12
Debian
CVE-2023-3724: wolfssl - If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key...2023
CVE-2023-3724 — Improper Input Validation in Wolfssl | cvebase