Description
Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic.
Published: 2026-03-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via process crash
Action: Immediate Patch
AI Analysis

Impact

An out‑of‑bounds read occurs in wolfSSL when it parses the Application‑Layer Protocol Negotiation (ALPN) extension during handshake. The vulnerability results from incomplete validation of the peer‑supplied ALPN protocol list, allowing a crafted list to trigger a memory read beyond the buffer. The flaw does not allow privilege escalation or disclosure of data; it only causes the wolfSSL process to crash, leading to a denial‑of‑service condition for any application relying on the library.

Affected Systems

The affected product is the wolfSSL library, version 5.8.4 and all earlier releases that enable ALPN (HAVE_ALPN or --enable-alpn). Although ALPN is disabled by default, it is automatically enabled for several third‑party compatibility builds, including those for Apache HTTPD, Bind, Curl, HAProxy, Hitch, Lighty, JNI, NGINX, and QUIC. Use of these builds with ALPN enabled exposes the system to the vulnerability.

Risk and Exploitability

The CVSS score is 7.5, indicating moderate‑to‑high severity, while the EPSS score is below 1 %, suggesting that widespread exploitation is unlikely. The flaw is not listed in CISA's KEV catalog. An attacker would need to target a service that uses wolfSSL with ALPN enabled and send a malicious ALPN list to trigger the crash. Because the vulnerability only causes a crash, it does not provide remote code execution or data exfiltration.

Generated by OpenCVE AI on March 26, 2026 at 19:53 UTC.

Remediation

Vendor Solution

apply the fix in wolfssl/wolfssl#9859 (or upgrade to a release that includes it).


Vendor Workaround

build without ALPN support if ALPN is not required.


OpenCVE Recommended Actions

  • Apply the patch from wolfssl/wolfssl#9859 or upgrade to a wolfSSL release that contains the fix.
  • If ALPN is not required, rebuild wolfSSL with the --disable-alpn flag to remove the vulnerable code path.

Generated by OpenCVE AI on March 26, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Vendors & Products Wolfssl
Wolfssl wolfssl

Thu, 19 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic.
Title wolfSSL: out-of-bounds read (DoS) in ALPN parsing due to incomplete validation
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-03-21T03:33:23.444Z

Reserved: 2026-03-04T18:38:04.989Z

Link: CVE-2026-3547

cve-icon Vulnrichment

Updated: 2026-03-21T03:33:19.145Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T21:17:12.653

Modified: 2026-03-26T18:27:31.467

Link: CVE-2026-3547

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:21:40Z

Weaknesses