CVE-2025-11936Improper Input Validation in Wolfssl

Severity
6.3MEDIUMNVD
EPSS
0.0%
top 91.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 21
Latest updateNov 22

Description

Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry values for the same supported group, leading to excessive CPU and memory consumption during ClientHello processing.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L

Affected Packages6 packages

debiandebian/wolfssl< wolfssl 5.8.4-1 (forky)
CVEListV5wolfssl/wolfssl3.12.05.8.4
NVDwolfssl/wolfssl5.8.25.8.4
Debianwolfssl/wolfssl< 5.8.4-1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2mmq-prpj-ww9q: Improper input validation in the TLS 12025-11-22
OSV
CVE-2025-11936: Improper input validation in the TLS 12025-11-21

📋Vendor Advisories

2
Microsoft
Potential DoS Vulnerability through Multiple KeyShareEntry with Same Group in TLS 1.3 ClientHello2025-11-11
Debian
CVE-2025-11936: wolfssl - Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2...2025
CVE-2025-11936 — Improper Input Validation in Wolfssl | cvebase