Description
Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.
Published: 2026-04-09
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Certificate Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises because wolfSSL does not verify the hash or digest size and OID when checking ECDSA certificates. As a result, signatures with digests smaller than the algorithm requires can be wrongly accepted. If an attacker can supply a certificate that uses such a reduced digest, they may be able to forge authentication requests that pass verification. The weakness is a classic checksum or hash check bypass, classified as CWE‑295.

Affected Systems

All deployments that use the wolfSSL library, particularly those that rely on ECDSA or ECC certificate verification without explicit size checks. No specific version ranges are listed, so any installation of wolfSSL that has not yet incorporated the patch linked in the advisory is potentially affected.

Risk and Exploitability

The CVSS score of 9.3 indicates a high overall risk to confidentiality and integrity. While no EPSS score is provided, the lack of a KEV listing suggests it has not yet been widely exploited, but the severity and the fact that the flaw allows a bypass of certificate verification implies that exploitation is feasible in environments where wolfSSL is used for secure communications. The likely attack vector is via a malicious certificate presented during a TLS handshake or equivalent certificate-based authentication process. Successful exploitation would grant an attacker the ability to impersonate a trusted party in the system.

Generated by OpenCVE AI on April 9, 2026 at 21:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the wolfSSL library to a version that includes the fix for digest size and OID validation in ECDSA certificate verification (see the pull request linked in the advisory).
  • If an upgrade is not immediately possible, consider disabling ECDSA certificate verification or applying application-level checks for digest size compatibility until the library is updated.

Generated by OpenCVE AI on April 9, 2026 at 21:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 10.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}

cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Fri, 10 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Vendors & Products Wolfssl
Wolfssl wolfssl

Fri, 10 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 10.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}

threat_severity

Critical


Thu, 09 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.
Title wolfSSL ECDSA Certificate Verification
Weaknesses CWE-295
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:L/SA:L/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-04-22T03:55:45.778Z

Reserved: 2026-03-30T22:13:40.162Z

Link: CVE-2026-5194

cve-icon Vulnrichment

Updated: 2026-04-10T18:05:50.389Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T20:16:28.420

Modified: 2026-04-16T20:37:11.433

Link: CVE-2026-5194

cve-icon Redhat

Severity : Critical

Publid Date: 2026-04-09T19:30:24Z

Links: CVE-2026-5194 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:35Z

Weaknesses