Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wolfssl wolfssl vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2019-19963
An issue exists in wolfSSL prior to 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
Wolfssl Wolfssl
7.5
CVSSv3
CVE-2022-39173
In wolfSSL prior to 5.5.1, malicious clients can cause a buffer overflow during a TLS 1.3 handshake. This occurs when an attacker supposedly resumes a previous TLS session. During the resumption Client Hello a Hello Retry Request must be triggered. Both Client Hellos are required...
Wolfssl Wolfssl
7.8
CVSSv3
CVE-2017-8854
wolfSSL prior to 3.10.2 has an out-of-bounds memory access with loading crafted DH parameters, aka a buffer overflow triggered by a malformed temporary DH file.
Wolfssl Wolfssl
9.8
CVSSv3
CVE-2019-6439
examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL up to and including 3.15.7 has a heap-based buffer overflow.
Wolfssl Wolfssl
2 Github repositories
5.9
CVSSv3
CVE-2022-38153
An issue exists in wolfSSL prior to 5.5.0 (when --enable-session-ticket is used); however, only version 5.3.0 is exploitable. Man-in-the-middle attackers or a malicious server can crash TLS 1.2 clients during a handshake. If an attacker injects a large ticket (more than 256 bytes...
Wolfssl Wolfssl 5.3.0
9.8
CVSSv3
CVE-2019-15651
wolfSSL 4.1.0 has a one-byte heap-based buffer over-read in DecodeCertExtensions in wolfcrypt/src/asn.c because reading the ASN_BOOLEAN byte is mishandled for a crafted DER certificate in GetLength_ex.
Wolfssl Wolfssl 4.1.0
3 Github repositories
9.8
CVSSv3
CVE-2019-11873
wolfSSL 4.0.0 has a Buffer Overflow in DoPreSharedKeys in tls13.c when a current identity size is greater than a client identity size. An attacker sends a crafted hello client packet over the network to a TLSv1.3 wolfSSL server. The length fields of the packet: record length, cli...
Wolfssl Wolfssl 4.0
7.5
CVSSv3
CVE-2020-11713
wolfSSL 4.3.0 has mulmod code in wc_ecc_mulmod_ex in ecc.c that does not properly resist timing side-channel attacks.
Wolfssl Wolfssl 4.3.0
5.9
CVSSv3
CVE-2017-13099
wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as "ROBOT."
Wolfssl Wolfssl
Siemens Scalance W1750d Firmware
Arubanetworks Instant
5.5
CVSSv3
CVE-2016-7440
The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) prior to 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.
Mariadb Mariadb
Oracle Mysql
Wolfssl Wolfssl
Debian Debian Linux 8.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »