Vulnerabilities
Vulnerable Software
Wolfssl:  Security Vulnerabilities
In wolfSSL before 4.3.0, wc_ecc_mulmod_ex does not properly resist side-channel attacks.
CVSS Score
5.3
EPSS Score
0.004
Published
2019-12-25
wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-12-25
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
CVSS Score
5.3
EPSS Score
0.004
Published
2019-12-25
wolfSSL and wolfCrypt 4.1.0 and earlier (formerly known as CyaSSL) generate biased DSA nonces. This allows a remote attacker to compute the long term private key from several hundred DSA signatures via a lattice attack. The issue occurs because dsa.c fixes two bits of the generated nonces.
CVSS Score
5.3
EPSS Score
0.004
Published
2019-12-11
wolfssl before 3.2.0 does not properly issue certificates for a server's hostname.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-11-21
wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-11-21
wolfssl before 3.2.0 has a server certificate that is not properly authorized for server authentication.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-11-21
In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free.
CVSS Score
7.5
EPSS Score
0.004
Published
2019-11-09
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
CVSS Score
4.7
EPSS Score
0.001
Published
2019-10-03
In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c.
CVSS Score
9.8
EPSS Score
0.009
Published
2019-09-24


Contact Us

Shodan ® - All rights reserved