Home

Description

Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.

PUBLISHED Reserved 2025-10-17 | Published 2025-11-21 | Updated 2025-11-24 | Assigner wolfSSL




LOW: 2.3CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

v5.8.2
affected

Credits

Jaehun Lee, Pohang University of Science and Technology (POSTECH) finder

Kyungmin Bae, Pohang University of Science and Technology (POSTECH) coordinator

References

github.com/wolfSSL/wolfssl

github.com/wolfSSL/wolfssl/pull/9132

cve.org (CVE-2025-11933)

nvd.nist.gov (CVE-2025-11933)

Download JSON