Description
Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.
Published: 2026-04-09
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

A heap buffer overflow is triggered in the CertFromX509 function when processing the AuthorityKeyIdentifier extension of an X.509 certificate. The implementation incorrectly calculates the buffer size required for the extension, causing an out‑of‑bounds write on the heap. This memory corruption can enable an attacker to overwrite adjacent data, potentially leading to arbitrary code execution or application crashes, depending on the context in which the certificate is parsed.

Affected Systems

The flaw appears in the wolfSSL library supplied by wolfSSL. No specific release versions are mentioned in the description, so any build containing the current CertFromX509 implementation could be vulnerable unless corrected by the vendor. Version information is not provided.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity. EPSS data is unavailable, and the issue is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply a crafted certificate to an application that uses wolfSSL for certificate parsing. Because the overflow occurs on the heap, an attacker may achieve remote code execution or cause a denial of service if the vulnerable component is exposed to untrusted input. The attack vector is inferred to be remote through untrusted certificates, such as those received over a network or from a user‑supplied source.

Generated by OpenCVE AI on April 10, 2026 at 01:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest wolfSSL patch that addresses CVE‑2026‑5447
  • If a patch is not yet available, restrict the use of the CertFromX509 function to certificates from trusted sources
  • Monitor applications for crashes or unusual memory usage in the certification path
  • Consult wolfSSL release notes for affected versions

Generated by OpenCVE AI on April 10, 2026 at 01:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Vendors & Products Wolfssl
Wolfssl wolfssl

Fri, 10 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-131
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

threat_severity

Moderate


Thu, 09 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Description Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.
Title Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
Weaknesses CWE-122
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-04-10T18:07:28.848Z

Reserved: 2026-04-02T19:39:14.309Z

Link: CVE-2026-5447

cve-icon Vulnrichment

Updated: 2026-04-10T18:07:23.221Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T21:16:13.150

Modified: 2026-04-29T17:21:51.310

Link: CVE-2026-5447

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-09T20:13:34Z

Links: CVE-2026-5447 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:21Z

Weaknesses