Description
wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against any message for any identity, using only publicly-known constants.
Published: 2026-04-10
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Forged Signature Verification
Action: Apply Patch
AI Analysis

Impact

The vulnerability occurs in wolfSSL’s ECCSI signature verifier function, wc_VerifyEccsiHash, which decodes the scalar values r and s from a signature blob using mp_read_unsigned_bin without verifying they fall within the valid range [1, q‑1]. The absence of this sanity check allows an adversary to craft a forged signature that will satisfy verification for any message and any identity that relies on ECCSI, effectively undermining authentication and integrity checks. This weakness is categorized as CWE‑347, representing Incorrect Validation of Cryptographic Parameters.

Affected Systems

This flaw affects installations of the wolfSSL library that use the vulnerable wc_VerifyEccsiHash implementation. All versions prior to the merge of pull request #10102 are at risk; the advisory does not list specific version numbers, so any older or unpatched release should be considered vulnerable. Deployments that employ wolfSSL for ECCSI‑based authentication in TLS or other cryptographic protocols are impacted.

Risk and Exploitability

The CVSS score of 7.6 signals high severity, and although EPSS is not available, the lack of a range check indicates a fundamental flaw that can be exploited remotely with only knowledge of public constants. The vulnerability is not currently listed in CISA’s KEV catalog, yet the attack can be carried out by substituting forged signatures in network messages or user‑payloads. The likely attack vector is thus inferred to be remote over a network or via an application that accepts externally supplied signatures, requiring no privileged local access or filesystem modification.

Generated by OpenCVE AI on April 10, 2026 at 04:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade wolfSSL to a version that includes the fix delivered in PR #10102 or newer, ensuring wc_VerifyEccsiHash performs scalar range checks.
  • Confirm that the application builds and runs against the updated library, verifying the patched function is active.
  • If an immediate upgrade is not feasible, disable ECCSI verification or replace it with an alternative signature scheme that properly validates parameters.
  • Monitor authentication logs for unexpected successful verifications or anomalous activity that could indicate exploitation.

Generated by OpenCVE AI on April 10, 2026 at 04:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Fri, 10 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
Vendors & Products Wolfssl
Wolfssl wolfssl

Fri, 10 Apr 2026 03:45:00 +0000

Type Values Removed Values Added
Description wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against any message for any identity, using only publicly-known constants.
Title wc_VerifyEccsiHash missing sanity check
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-04-22T03:55:48.877Z

Reserved: 2026-04-03T07:07:31.067Z

Link: CVE-2026-5466

cve-icon Vulnrichment

Updated: 2026-04-10T13:43:31.353Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T04:17:16.420

Modified: 2026-04-29T13:49:42.780

Link: CVE-2026-5466

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:57Z

Weaknesses