CVE-2026-5194 PUBLISHED

wolfSSL ECDSA Certificate Verification

Assigner: wolfSSL
Reserved: 30.03.2026 Published: 09.04.2026 Updated: 09.04.2026

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:L/SA:L/U:Red
CVSS Score: 9.3

Product Status

Vendor wolfSSL
Product wolfSSL
Versions Default: unaffected
  • affected from 3.12.0 to 5.9.1 (excl.)

Credits

  • Nicholas Carlini from Anthropic finder

References

Problem Types

  • CWE-295 Improper Certificate Validation CWE