Man-in-the-Middle Vulnerability in wolfSSL Product
CVE-2022-38153

5.9MEDIUM

Key Information:

Vendor
Wolfssl
Status
Vendor
CVE Published:
31 August 2022

Summary

A vulnerability has been identified in wolfSSL that allows man-in-the-middle attackers to disrupt TLS 1.2 clients during the handshake process. By injecting an oversized ticket into a NewSessionTicket message, the session cache may attempt to free an unallocated pointer, leading to a crash with a 'free(): invalid pointer' error. This exploit primarily affects wolfSSL version 5.3.0, while subsequent versions may offer mitigations. It is worth noting that this vulnerability may also have implications for TLS 1.3 handshakes, although it cannot be leveraged in that context. Users are advised to update to secure versions and review their configuration for potential exposure.

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-38153 : Man-in-the-Middle Vulnerability in wolfSSL Product | SecurityVulnerability.io