Impact
The vulnerability arises because wolfSSL does not verify the hash or digest size and OID when checking ECDSA certificates. As a result, signatures with digests smaller than the algorithm requires can be wrongly accepted. If an attacker can supply a certificate that uses such a reduced digest, they may be able to forge authentication requests that pass verification. The weakness is a classic checksum or hash check bypass, classified as CWE‑295.
Affected Systems
All deployments that use the wolfSSL library, particularly those that rely on ECDSA or ECC certificate verification without explicit size checks. No specific version ranges are listed, so any installation of wolfSSL that has not yet incorporated the patch linked in the advisory is potentially affected.
Risk and Exploitability
The CVSS score of 9.3 indicates a high overall risk to confidentiality and integrity. While no EPSS score is provided, the lack of a KEV listing suggests it has not yet been widely exploited, but the severity and the fact that the flaw allows a bypass of certificate verification implies that exploitation is feasible in environments where wolfSSL is used for secure communications. The likely attack vector is via a malicious certificate presented during a TLS handshake or equivalent certificate-based authentication process. Successful exploitation would grant an attacker the ability to impersonate a trusted party in the system.
OpenCVE Enrichment