Missing Hash Size and OID Checks in wolfSSL's ECDSA Verification
CVE-2026-5194

9.3CRITICAL

Key Information:

Vendor

Wolfssl

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-5194?

This vulnerability in wolfSSL arises from inadequate hash size and Object Identifier (OID) checks during ECDSA certificate verification. Attackers can exploit this flaw to bypass security measures, allowing digests smaller than permissible for the specified key type to be accepted by signature verification functions. If the public Certificate Authority (CA) key is known, this could significantly weaken the security posture of ECDSA certificate-based authentication, particularly in environments where EdDSA or ML-DSA are enabled.

Affected Version(s)

wolfSSL 3.12.0 < 5.9.1

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nicholas Carlini from Anthropic
.