Improper Input Validation in wolfSSL Affects Multiple Platforms
CVE-2025-11936
6.3MEDIUM
What is CVE-2025-11936?
A flaw in the parsing of KeyShareEntry values in wolfSSL v5.8.2 can be exploited by an unauthenticated remote attacker. By sending a specially crafted ClientHello message with duplicate KeyShareEntry values for the same supported group, the attacker may induce excessive CPU and memory consumption, resulting in service disruptions. This vulnerability highlights the need for robust input validation to protect against potential denial-of-service attacks.
Affected Version(s)
wolfSSL Linux v5.8.2
References
CVSS V4
Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jaehun Lee, Pohang University of Science and Technology (POSTECH)
Kyungmin Bae, Pohang University of Science and Technology (POSTECH)
