CVE-2025-11933Improper Input Validation in Wolfssl

Severity
2.3LOWNVD
EPSS
0.0%
top 87.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 21
Latest updateNov 22

Description

Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L

Affected Packages6 packages

CVEListV5wofssl/wolfssl3.12.05.8.4
debiandebian/wolfssl< wolfssl 5.8.4-1 (forky)
NVDwolfssl/wolfssl5.8.25.8.4
Debianwolfssl/wolfssl< 5.8.4-1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-g9wx-2hxf-f2rj: Improper Input Validation in the TLS 12025-11-22
OSV
CVE-2025-11933: Improper Input Validation in the TLS 12025-11-21

📋Vendor Advisories

2
Microsoft
DoS Vulnerability in wolfSSL TLS 1.3 CKS Extension2025-11-11
Debian
CVE-2025-11933: wolfssl - Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 ...2025
CVE-2025-11933 — Improper Input Validation in Wolfssl | cvebase