Wolfssl Inc Wolfssl vulnerabilities
3 known vulnerabilities affecting wolfssl_inc/wolfssl.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2026-3849MEDIUMCVSS 6.9≥ v5.6.0-stable, ≤ v5.8.4-stable2026-03-19
CVE-2026-3849 [MEDIUM] CWE-787 CVE-2026-3849: Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in
Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote execution and client program crash. This could be exploited by a malicious TLS
nvd
CVE-2026-3503MEDIUMCVSS 4.3≥ 5.8.2, < 5.9.02026-03-19
CVE-2026-3503 [MEDIUM] CWE-335 CVE-2026-3503: Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSS
Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.
This issue affects wolfSSL
nvd
CVE-2024-5288MEDIUMCVSS 5.9≤ 5.7.02024-08-27
CVE-2024-5288 [MEDIUM] CWE-922 CVE-2024-5288: An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PRO
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,
such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connecti
nvd