CVE-2026-3549 PUBLISHED

ECH parsing heap buffer overflow

Assigner: wolfSSL
Reserved: 04.03.2026 Published: 19.03.2026 Updated: 19.03.2026

Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L
CVSS Score: 8.3

Product Status

Vendor wofSSL
Product wolfSSL
Versions Default: unaffected
  • affected from 0 to 5.9.0 (excl.)

Credits

  • Oleh Konko for independently reporting after internal wolfSSL findings and testing wolfSSL's fix other

References

Problem Types

  • CWE-122 Heap-based buffer overflow CWE