Impact
The vulnerability is a 1‑to‑2‑byte buffer overflow that occurs when parsing the notAfter and notBefore fields of an X.509 certificate via the compatibility layer API. This flaw could corrupt memory in the calling application, potentially leading to crashes or arbitrary code execution if exploited. However, the impact is limited to code that directly invokes these APIs and does not affect TLS or certificate verification paths.
Affected Systems
The affected product is the wolfSSL SSL/TLS library. No specific version information is provided, so any release containing the unpatched functions may be vulnerable. All installations of wolfSSL that use the compatibility layer functions for certificate date parsing should be considered at risk.
Risk and Exploitability
The CVSS score of 2.3 signifies low overall severity, and the vulnerability is not listed in the CISA KEV catalog, with no EPSS data available. Exploitation requires an attacker to supply a crafted certificate to an application that calls the vulnerable API functions directly. Because TLS and routine certificate verification are unaffected, the likelihood of widespread exploitation is low, but the defect can still compromise the stability or integrity of the vulnerable application.
OpenCVE Enrichment