Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
Fri, 21 Nov 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry values for the same supported group, leading to excessive CPU and memory consumption during ClientHello processing. | |
| Title | Potential DoS Vulnerability through Multiple KeyShareEntry with Same Group in TLS 1.3 ClientHello | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2025-11-24T17:59:03.202Z
Reserved: 2025-10-17T22:28:29.097Z
Link: CVE-2025-11936
Updated: 2025-11-24T16:19:54.793Z
Status : Awaiting Analysis
Published: 2025-11-21T23:15:44.710
Modified: 2025-11-25T22:16:42.557
Link: CVE-2025-11936
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:08:15Z