Impact
The vulnerability resides in wolfSSL’s EVP API, where ChaCha20-Poly1305 decryption does not verify the authentication tag before returning plaintext. An attacker who can supply a forged tag can cause the application to accept corrupted data, compromising data integrity and potentially revealing confidential information if the ciphertext is controlled.
Affected Systems
The flaw affects the wolfSSL library for any builds that employ ChaCha20-Poly1305 via the EVP interface. Version information is not specified, so all releases before the fix in PR 10102 should be treated as potentially vulnerable until a patched release is deployed.
Risk and Exploitability
The CVSS score of 7.6 indicates medium‑high severity. EPSS is not available and the vulnerability is not in KEV, yet the attack path is straightforward: an application using wolfSSL for ChaCha20‑Poly1305 can be subverted by providing a malformed authentication tag. Because wolfSSL is widely used in embedded, IoT, and network services, the impact could be significant for any environment that does not apply the patch.
OpenCVE Enrichment