Home

Description

Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256.

PUBLISHED Reserved 2025-10-17 | Published 2025-11-21 | Updated 2025-11-24 | Assigner wolfSSL




LOW: 2.1CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

v5.8.2
affected

Credits

Jaehun Lee, Pohang University of Science and Technology (POSTECH) finder

Kyungmin Bae, Pohang University of Science and Technology (POSTECH) coordinator

References

github.com/wolfSSL/wolfssl/pull/9113 exploit

github.com/wolfSSL/wolfssl

github.com/wolfSSL/wolfssl/pull/9113

cve.org (CVE-2025-11934)

nvd.nist.gov (CVE-2025-11934)

Download JSON