Heap Buffer Overflow in DTLS 1.3 Affects WolfSSL
CVE-2026-5264

8.3HIGH

Key Information:

Vendor

Wolfssl

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-5264?

A vulnerability exists in the DTLS 1.3 implementation within WolfSSL that allows a remote attacker to send a specially crafted ACK message. This can exploit a heap buffer overflow, potentially leading to unauthorized actions and disruption of service. It is crucial for users of affected WolfSSL versions to apply security patches to mitigate potential risks associated with this flaw.

Affected Version(s)

wolfSSL 0 < 5.9.1

References

CVSS V4

Score:
8.3
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sunwoo Lee, Korea Institute of Energy Technology (KENTECH)
Seunghyun Yoon, Korea Institute of Energy Technology (KENTECH)
.