Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-42905


In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)


Published

2022-11-07T00:15:09.643

Last Modified

2025-05-02T19:15:54.400

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.1 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-125
  • Type: Secondary
    CWE-125

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application wolfssl wolfssl < 5.5.2 Yes

References