TLS 1.3 Vulnerability in wolfSSL Affects Secure Connections
CVE-2021-3336

8.1HIGH

Key Information:

Vendor
Wolfssl
Status
Vendor
CVE Published:
29 January 2021

Summary

In wolfSSL versions prior to 4.7.0, the DoTls13CertificateVerify function in tls13.c fails to properly handle certain anomalous behaviors from peers. Specifically, it does not halt processing when a client sends an ED25519, ED448, ECC, or RSA signature without the corresponding certificate. This oversight exposes the client to potential impersonation attacks by man-in-the-middle attackers targeting TLS 1.3 connections.

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.