Buffer Overflow Vulnerability in wolfSSL Affected by X.509 Certificate Parsing Issues
CVE-2026-5448

2.3LOW

Key Information:

Vendor

Wolfssl

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-5448?

The vulnerability in wolfSSL arises from a buffer overflow that may occur when parsing date fields from a specially crafted X.509 certificate through the compatibility layer API. This issue specifically affects applications that directly call the wolfSSL_X509_notAfter and wolfSSL_X509_notBefore APIs. Importantly, TLS and certificate verification operations remain unaffected, mitigating broader impact.

Affected Version(s)

wolfSSL 0 < 5.9.1

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sunwoo Lee, Korea Institute of Energy Technology (KENTECH)
Seunghyun Yoon, Korea Institute of Energy Technology (KENTECH)
.