Description
Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large value that is passed to AEAD decryption routines, causing heap buffer overflow and a crash. An unauthenticated attacker can trigger this remotely via malformed TLS Application Data records.
Published: 2026-03-19
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Heap Buffer Overflow
Action: Patch
AI Analysis

Impact

An integer underflow in wolfSSL’s packet sniffer causes a heap buffer overflow in the AEAD decryption routine. The underflow wraps a 16‑bit length field to an unexpectedly large value, which is then passed to the decryption routine for TLS Application Data records that are shorter than the explicit IV plus authentication tag. The resulting write beyond bounds triggers a heap buffer overflow and causes a crash. The primary impact is a denial‑of‑service; the vulnerability does not allow an attacker to gain code execution or elevated privileges. This weakness is classified as CWE‑191.

Affected Systems

The defective code exists in the wolfSSL library’s packet sniffer component. All releases up to and including version 5.8.4 are affected. The vendor listed is wolfSSL. No specific product sub‑versions are enumerated beyond the ≤5.8.4 boundary.

Risk and Exploitability

The CVSS base score is 2.1, indicating low severity. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog. An unauthenticated attacker can trigger the flaw remotely by injecting malformed TLS Application Data records into traffic inspected by the sniffer. The attack requires no privileges and only results in a service crash; it does not allow code execution. Due to the limited scope and need for crafted network traffic, the overall exploitation risk is low but remediation is still recommended.

Generated by OpenCVE AI on March 19, 2026 at 18:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade wolfSSL to a version newer than 5.8.4 once an official patch is released.
  • If a patch cannot be applied immediately, disable the packet sniffer functionality in the wolfSSL configuration to remove the vulnerability.
  • As a temporary defense, filter or drop malformed TLS Application Data records at the network perimeter before they reach systems that use the sniffer.

Generated by OpenCVE AI on March 19, 2026 at 18:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Vendors & Products Wolfssl
Wolfssl wolfssl

Thu, 19 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large value that is passed to AEAD decryption routines, causing heap buffer overflow and a crash. An unauthenticated attacker can trigger this remotely via malformed TLS Application Data records.
Title Integer underflow leads to out-of-bounds access in sniffer AES-GCM/CCM/ARIA-GCM decrypt path
Weaknesses CWE-191
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-03-19T17:20:03.448Z

Reserved: 2026-01-15T21:02:31.737Z

Link: CVE-2026-1005

cve-icon Vulnrichment

Updated: 2026-03-19T17:19:58.892Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T17:16:21.873

Modified: 2026-03-20T13:39:46.493

Link: CVE-2026-1005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T11:06:48Z

Weaknesses