Description
Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving.
Published: 2026-03-19
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption via Heap Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A vulnerable implementation of the ECH (Encrypted Client Hello) extension in TLS 1.3 gives rise to an integer underflow when determining the size of a buffer required to parse an ECH payload. The underflow causes the calculated buffer length to be smaller than the actual data processed, leading to a write beyond the allocated memory bounds. This type of flaw can corrupt adjacent memory structures and potentially allow an attacker to influence program control flow, crash the application, or execute arbitrary code. The weakness is categorized as CWE-122, reflecting a classic heap-based buffer overflow.\n

Affected Systems

The flaw is present in the wolfSSL library, a widely used TLS/SSL implementation. The ECH extension handling is disabled by default in wolfSSL; however, systems that have enabled or plan to enable ECH are affected. No specific vulnerable version numbers are listed in the advisory, so any build of wolfSSL that has not incorporated the pull request correcting this issue remains impacted.\n

Risk and Exploitability

The CVSS score of 8.3 marks the vulnerability as High, indicating significant risk when it is exploitable. Epistemic probability analysis shows an EPSS score of less than 1%, suggesting that, at present, the overall likelihood of exploitation in the wild is low. The vulnerability has not been catalogued in CISA’s Known Exploited Vulnerabilities list. Exploitation would require an attacker to initiate a TLS 1.3 connection with an ECH payload that triggers the integer underflow; thus the attack vector is network-based, specifically through crafted TLS traffic. The exploit would need to reach the vulnerable code path in the library before any mitigations such as security hardening or runtime defenses can intervene.}\n

Generated by OpenCVE AI on March 26, 2026 at 19:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest wolfSSL release that includes the fix committed in pull request 9817. If an immediate update is not possible, disable the ECH extension in your configuration until the library is patched.
  • Verify that your deployment does not rely on the ECH feature; if not needed, ensure it remains turned off. If ECH is required, monitor the wolfSSL project for the release of an official patch and deploy it promptly.
  • Maintain a security‑aware update workflow: regularly check the wolfSSL release notes, subscribe to security mailing lists, and audit any custom TLS configurations for unintended exposure.

Generated by OpenCVE AI on March 26, 2026 at 19:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Vendors & Products Wolfssl
Wolfssl wolfssl

Thu, 19 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving.
Title ECH parsing heap buffer overflow
Weaknesses CWE-122
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-03-24T01:38:13.951Z

Reserved: 2026-03-04T18:44:13.820Z

Link: CVE-2026-3549

cve-icon Vulnrichment

Updated: 2026-03-24T01:38:09.221Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T21:17:12.823

Modified: 2026-03-26T18:21:41.360

Link: CVE-2026-3549

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T08:41:48Z

Weaknesses