Impact
A heap buffer overflow occurs during DTLS 1.3 ACK message processing. The flaw allows a remote participant to send a specially crafted ACK packet that overwrites memory on the heap, potentially enabling arbitrary code execution or processes to crash. The weakness is classified as CWE‑122, indicating a classic heap overflow.
Affected Systems
The vulnerability affects the wolfSSL library as distributed by wolfSSL. No specific product version is listed, but all builds handling DTLS 1.3 are potentially impacted until a patched release is available.
Risk and Exploitability
The CVSS score of 8.3 shows high severity. The EPSS score is not available, and the flaw is not listed in the CISA KEV catalog. The likely attack vector is remote; an adversary must reach the DTLS endpoint and send a crafted ACK message. No further prerequisites are stated, implying the vulnerability is exploitable in standard use scenarios.
OpenCVE Enrichment