Ad

CVE-2026-2646

MEDIUM CVSS 4.0: 5.0 EPSS 0.01%
Updated Mar 20, 2026
Parameter Value
CVSS 5.0 (MEDIUM)
Type CWE-122 (Heap-based Buffer Overflow)
Public PoC No

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability.

Internal sessions were not vulnerable.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
High
Difficult to exploit
Attack Requirements
Present
Additional conditions required
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v4.0