Vulnerabilities
Vulnerable Software
Wolfssl:  >> Wolfssl  >> 2.5.0  Security Vulnerabilities
wolfssl before 3.2.0 does not properly issue certificates for a server's hostname.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-11-21
wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-11-21
wolfssl before 3.2.0 has a server certificate that is not properly authorized for server authentication.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-11-21
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
CVSS Score
4.7
EPSS Score
0.001
Published
2019-10-03
In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c.
CVSS Score
9.8
EPSS Score
0.009
Published
2019-09-24
examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL through 3.15.7 has a heap-based buffer overflow.
CVSS Score
9.8
EPSS Score
0.013
Published
2019-01-16
It was found that wolfssl before 3.15.7 is vulnerable to a new variant of the Bleichenbacher attack to perform downgrade attacks against TLS. This may lead to leakage of sensible data.
CVSS Score
5.9
EPSS Score
0.001
Published
2019-01-03
wolfcrypt/src/ecc.c in wolfSSL before 3.15.1.patch allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
CVSS Score
4.7
EPSS Score
0.001
Published
2018-06-15
wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as "ROBOT."
CVSS Score
7.5
EPSS Score
0.691
Published
2017-12-13
CyaSSL does not check the key usage extension in leaf certificates, which allows remote attackers to spoof servers via a crafted server certificate not authorized for use in an SSL/TLS handshake.
CVSS Score
5.9
EPSS Score
0.002
Published
2017-10-06


Contact Us

Shodan ® - All rights reserved