Buffer Overflow Vulnerability in wolfSSL Affected by X.509 Certificate Parsing Issues
CVE-2026-5448
2.3LOW
What is CVE-2026-5448?
The vulnerability in wolfSSL arises from a buffer overflow that may occur when parsing date fields from a specially crafted X.509 certificate through the compatibility layer API. This issue specifically affects applications that directly call the wolfSSL_X509_notAfter and wolfSSL_X509_notBefore APIs. Importantly, TLS and certificate verification operations remain unaffected, mitigating broader impact.
Affected Version(s)
wolfSSL 0 < 5.9.1
References
CVSS V4
Score:
2.3
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Sunwoo Lee, Korea Institute of Energy Technology (KENTECH)
Seunghyun Yoon, Korea Institute of Energy Technology (KENTECH)
