Heap Buffer Overflow in wolfSSL Affecting Session Management
CVE-2026-2646

5MEDIUM

Key Information:

Vendor

Wolfssl

Status
Vendor
CVE Published:
19 March 2026

What is CVE-2026-2646?

CVE-2026-2646 is a vulnerability identified within wolfSSL, a well-known cryptographic library that provides SSL/TLS support for embedded systems and applications. This particular vulnerability is a heap buffer overflow occurring in the wolfSSL_d2i_SSL_SESSION() function. The overflow arises when session data is deserialized while having SESSION_CERTS enabled, where the lengths of the certificate and session ID are improperly read from untrusted input without adequate bounds validation. The result is an attacker’s potential to exploit fixed-size buffers, leading to corruption of heap memory. This vulnerability is particularly dangerous as it requires the loading of a maliciously crafted session from an external source to trigger the overflow, although it is important to note that internally managed sessions are not affected.

Potential impact of CVE-2026-2646

  1. Remote Code Execution: The vulnerability could potentially allow attackers to execute arbitrary code on affected systems. With heap memory corruption, bad actors might manipulate the program’s execution flow, leading to unauthorized operations.

  2. Data Breaches: Exploitation of this vulnerability poses a significant risk of exposing sensitive data. This can include confidential session information or other critical data used by applications utilizing wolfSSL, leading to compromise of user data or organizational secrets.

  3. Denial of Service: Attackers might leverage this vulnerability to disrupt services. By crashing the application or making it behave unpredictably, an organization could face extended downtime, resulting in financial losses and damage to reputation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

wolfssl 0 <= 5.8.4

References

CVSS V4

Score:
5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jonathan Bar Or (@yo_yo_yo_jbo)
Haruto Kimura (Stella)
.