Impact
When wolfSSL restores a session from cache, it uses a pointer extracted from the serialized session data to perform a free operation without validating that pointer. This deserialization flaw permits an attacker to trigger an arbitrary memory free, which can lead to program termination or serve as a stepping stone for more complex memory corruption attacks.
Affected Systems
The vulnerability affects the wolfSSL library across all versions that include the described session restore code. No specific version range is provided, so any release containing this code may be impacted until a patch is applied.
Risk and Exploitability
The CVSS score of 4.1 indicates moderate severity, and the vulnerability is not listed in CISA’s KEV catalog, suggesting limited known exploitation. Based on the description, it is inferred that an attacker must be able to inject a crafted session into the cache and trigger the session restore APIs. This capability could be achieved if an application exposes an endpoint that accepts session data. Successful exploitation could result in denial of service or an oracle for further attacks via memory corruption.
OpenCVE Enrichment