CVE-2026-3230 PUBLISHED

Improper key_share validation in TLS 1.3 HelloRetryRequest

Assigner: wolfSSL
Reserved: 25.02.2026 Published: 19.03.2026 Updated: 19.03.2026

Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/AU:Y/R:A/V:D/U:Clear
CVSS Score: 1.2

Product Status

Vendor wolfSSL
Product wolfSSL
Versions Default: unaffected
  • affected from 0 to 5.9.0 (excl.)

Credits

  • Jaehun Lee, Pohang University of Science and Technology (POSTECH) finder
  • Kyungmin Bae, Pohang University of Science and Technology (POSTECH) coordinator

References

Problem Types

  • CWE-20 Improper Input Validation Improper Input Validation CWE

Impacts

  • CAPEC-220 Client-Server Protocol Manipulation