CVE-2025-11934Improper Input Validation in Wolfssl

Severity
2.1LOWNVD
EPSS
0.0%
top 96.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 21
Latest updateNov 22

Description

Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N

Affected Packages6 packages

debiandebian/wolfssl< wolfssl 5.8.4-1 (forky)
CVEListV5wolfssl/wolfssl3.12.05.8.4
NVDwolfssl/wolfssl5.8.25.8.4
Debianwolfssl/wolfssl< 5.8.4-1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-wq2x-6c88-jrh3: Improper input validation in the TLS 12025-11-22
OSV
CVE-2025-11934: Improper input validation in the TLS 12025-11-21

📋Vendor Advisories

2
Microsoft
Improper Validation of Signature Algorithm Used in TLS 1.3 CertificateVerify2025-11-11
Debian
CVE-2025-11934: wolfssl - Improper input validation in the TLS 1.3 CertificateVerify signature algorithm n...2025
CVE-2025-11934 — Improper Input Validation in Wolfssl | cvebase