Vulnerabilities (CVE)

Filtered by vendor Wolfssl Subscribe
Total 59 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-19963 1 Wolfssl 1 Wolfssl 2020-01-02 4.3 MEDIUM 5.3 MEDIUM
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
CVE-2019-19960 1 Wolfssl 1 Wolfssl 2020-01-02 4.3 MEDIUM 5.3 MEDIUM
In wolfSSL before 4.3.0, wc_ecc_mulmod_ex does not properly resist side-channel attacks.
CVE-2014-2901 1 Wolfssl 1 Wolfssl 2019-12-04 5.0 MEDIUM 7.5 HIGH
wolfssl before 3.2.0 does not properly issue certificates for a server's hostname.
CVE-2014-2902 1 Wolfssl 1 Wolfssl 2019-12-04 5.0 MEDIUM 7.5 HIGH
wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates.
CVE-2014-2904 1 Wolfssl 1 Wolfssl 2019-12-04 5.0 MEDIUM 7.5 HIGH
wolfssl before 3.2.0 has a server certificate that is not properly authorized for server authentication.
CVE-2019-18840 1 Wolfssl 1 Wolfssl 2019-11-12 5.0 MEDIUM 7.5 HIGH
In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free.
CVE-2019-13628 1 Wolfssl 1 Wolfssl 2019-10-10 1.2 LOW 4.7 MEDIUM
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
CVE-2018-16870 1 Wolfssl 1 Wolfssl 2019-10-09 4.3 MEDIUM 5.9 MEDIUM
It was found that wolfssl before 3.15.7 is vulnerable to a new variant of the Bleichenbacher attack to perform downgrade attacks against TLS. This may lead to leakage of sensible data.
CVE-2017-13099 3 Arubanetworks, Siemens, Wolfssl 4 Instant, Scalance W1750d, Scalance W1750d Firmware and 1 more 2019-10-09 4.3 MEDIUM 5.9 MEDIUM
wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as "ROBOT."
CVE-2017-8855 1 Wolfssl 1 Wolfssl 2019-10-03 5.0 MEDIUM 7.5 HIGH
wolfSSL before 3.11.0 does not prevent wc_DhAgree from accepting a malformed DH key.
CVE-2019-16748 1 Wolfssl 1 Wolfssl 2019-09-24 7.5 HIGH 9.8 CRITICAL
In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c.
CVE-2019-15651 1 Wolfssl 1 Wolfssl 2019-09-03 7.5 HIGH 9.8 CRITICAL
wolfSSL 4.1.0 has a one-byte heap-based buffer over-read in DecodeCertExtensions in wolfcrypt/src/asn.c because reading the ASN_BOOLEAN byte is mishandled for a crafted DER certificate in GetLength_ex.
CVE-2017-6076 1 Wolfssl 1 Wolfssl 2019-03-13 2.1 LOW 5.5 MEDIUM
In versions of wolfSSL before 3.10.2 the function fp_mul_comba makes it easier to extract RSA key information for a malicious user who has access to view cache on a machine.
CVE-2018-12436 1 Wolfssl 1 Wolfssl 2018-08-06 1.9 LOW 4.7 MEDIUM
wolfcrypt/src/ecc.c in wolfSSL before 3.15.1.patch allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
CVE-2014-2903 1 Wolfssl 1 Wolfssl 2017-10-17 4.3 MEDIUM 5.9 MEDIUM
CyaSSL does not check the key usage extension in leaf certificates, which allows remote attackers to spoof servers via a crafted server certificate not authorized for use in an SSL/TLS handshake.
CVE-2017-8854 1 Wolfssl 1 Wolfssl 2017-05-17 6.8 MEDIUM 7.8 HIGH
wolfSSL before 3.10.2 has an out-of-bounds memory access with loading crafted DH parameters, aka a buffer overflow triggered by a malformed temporary DH file.
CVE-2016-7439 1 Wolfssl 1 Wolfssl 2016-12-24 2.1 LOW 5.5 MEDIUM
The C software implementation of RSA in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover RSA keys by leveraging cache-bank hit differences.
CVE-2016-7438 1 Wolfssl 1 Wolfssl 2016-12-24 2.1 LOW 5.5 MEDIUM
The C software implementation of ECC in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover RSA keys by leveraging cache-bank hit differences.
CVE-2015-6925 1 Wolfssl 1 Wolfssl 2016-01-25 5.0 MEDIUM 7.5 HIGH
wolfSSL (formerly CyaSSL) before 3.6.8 allows remote attackers to cause a denial of service (resource consumption or traffic amplification) via a crafted DTLS cookie in a ClientHello message.