CVE-2026-0819Stack-based Buffer Overflow in Wolfssl

Severity
2.2LOWNVD
EPSS
0.0%
top 94.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 19

Description

A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encoding functionality. In wc_PKCS7_BuildSignedAttributes(), when adding custom signed attributes, the code passes an incorrect capacity value (esd->signedAttribsCount) to EncodeAttributes() instead of the remaining available space in the fixed-size signedAttribs[7] array. When an application sets pkcs7->signedAttribsSz to a value greater than MAX_SIGNED_ATTRIBS_SZ (default 7) minus the number of default attributes alread

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages5 packages

debiandebian/wolfssl< wolfssl 5.9.0-0.1 (forky)
CVEListV5wolfssl/wolfssl5.5.05.9.0
Debianwolfssl/wolfssl< 5.9.0-0.1

🔴Vulnerability Details

2
OSV
CVE-2026-0819: A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encoding functionality2026-03-19
GHSA
GHSA-3cr6-hpf3-2hmg: A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encoding functionality2026-03-19

📋Vendor Advisories

2
Microsoft
Stack buffer overflow in PKCS7 SignedData encoding with custom signed attributes2026-03-10
Debian
CVE-2026-0819: wolfssl - A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encod...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-0819 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-0819 — Stack-based Buffer Overflow in Wolfssl | cvebase