Impact
An out‑of‑bounds read in wolfSSHd on Windows occurs when the server processes a terminal resize request, allowing an authenticated user to leak the content of adjacent stack memory into the pseudo‑console output. This can expose sensitive data stored on the stack and potentially compromise confidentiality. The weakness is a classic buffer overread (CWE‑126).
Affected Systems
This issue affects the wolfSSL wolfSSH product on Windows platforms. No specific affected versions are listed in the advisory, so the recommendation is to apply the most recent patch that addresses the resize handling bug.
Risk and Exploitability
The vulnerability carries a low CVSS score of 2.3 and has no EPSS data available; it is not listed in the CISA KEV catalog. The attack requires an authenticated SSH session; after establishing the connection, a malicious user can send a terminal resize command to trigger the read. Because the exploit relies on normal operational actions rather than a malicious code payload, the practical risk is primarily limited to confidentiality leakage rather than remote code execution.
OpenCVE Enrichment