Description
Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote execution and client program crash. This could be exploited by a malicious TLS server supporting ECH. Note that ECH is off by default, and is only enabled with enable-ech.
Published: 2026-03-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Upgrade
AI Analysis

Impact

A stack buffer overflow occurs in the wc_HpkeLabeledExtract function of wolfSSL when it processes an oversized Encrypted Client Hello (ECH) configuration packet supplied by a TLS server. The flaw allows the attacker to execute arbitrary code or crash the client application, compromising confidentiality, integrity, and availability on the affected device. The vulnerability is triggered only if ECH is enabled, and the overflow happens on the client side during the extraction of HPKE parameters.

Affected Systems

The affected package is wolfSSL Inc.'s wolfSSL library version 5.8.4, which implements ECH support. Any client that uses this library with the enable‑ech option set is vulnerable. Versions older than 5.8.4 or those patched after 5.8.4 are not affected.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score of less than 1 % suggests a low probability of active exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a malicious TLS server capable of sending an oversized ECH configuration; if the server is under the attacker’s control or the client accepts connections from untrusted parties, remote code execution or a client crash can result.

Generated by OpenCVE AI on April 15, 2026 at 08:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade wolfSSL to a release that includes the HPKE ECH patch (a version newer than 5.8.4).
  • If upgrading is not immediately possible, disable ECH by removing the enable‑ech option from the client configuration.
  • Restrict the client to communicate only with trusted TLS servers by validating certificates or applying certificate pinning, thereby reducing the opportunity for a malicious server to deliver an oversized ECH packet.

Generated by OpenCVE AI on April 15, 2026 at 08:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Vendors & Products Wolfssl
Wolfssl wolfssl

Thu, 19 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote execution and client program crash. This could be exploited by a malicious TLS server supporting ECH. Note that ECH is off by default, and is only enabled with enable-ech.
Title Buffer Overflow in HPKE via Oversized ECH Config
Weaknesses CWE-787
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/V:D/RE:M/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-03-25T14:21:17.389Z

Reserved: 2026-03-09T19:50:50.081Z

Link: CVE-2026-3849

cve-icon Vulnrichment

Updated: 2026-03-25T14:21:10.835Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T21:17:13.407

Modified: 2026-03-26T18:20:36.580

Link: CVE-2026-3849

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses