Buffer Over-Read Vulnerability in wolfSSL Product
CVE-2022-42905
9.1CRITICAL
Summary
In wolfSSL versions earlier than 5.5.2, the use of callback functions (enabled by the WOLFSSL_CALLBACKS flag) poses a risk. A threat actor, acting as a malicious TLS 1.3 client or a network adversary, can exploit this vulnerability to cause a buffer over-read on the heap, resulting in the disclosure of potentially sensitive data. This vulnerability primarily impacts systems that utilize the WOLFSSL_CALLBACKS option, which is primarily intended for debugging purposes, and should be used with caution.
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved