TLS 1.3 Vulnerability in wolfSSL Affects Secure Connections
CVE-2021-3336
8.1HIGH
Summary
In wolfSSL versions prior to 4.7.0, the DoTls13CertificateVerify function in tls13.c fails to properly handle certain anomalous behaviors from peers. Specifically, it does not halt processing when a client sends an ED25519, ED448, ECC, or RSA signature without the corresponding certificate. This oversight exposes the client to potential impersonation attacks by man-in-the-middle attackers targeting TLS 1.3 connections.
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved