No analysis available yet.
Vendor Solution
Update wolfSSL to 5.7.2.
Vendor Workaround
On client side, use the wolfSSL methods for specific protocol versions instead of the downgrade API.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46962 | A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500 |
Sat, 06 Dec 2025 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 27 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:2.3:a:wolfssl:wolfssl:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
|
| Metrics |
ssvc
|
Tue, 27 Aug 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500 | |
| Title | Unverifed Ciphersuite used on a client-side TLS1.3 Downgrade | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2024-08-27T19:21:04.561Z
Reserved: 2024-06-10T19:48:59.670Z
Link: CVE-2024-5814
Updated: 2024-08-27T19:20:38.320Z
Status : Analyzed
Published: 2024-08-27T19:15:17.980
Modified: 2025-12-06T00:54:13.963
Link: CVE-2024-5814
No data.
OpenCVE Enrichment
No data.
EUVD