CVE-2024-5814

A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

06 Dec 2025, 00:54

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#add_later - () https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#add_later - Release Notes
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
First Time Wolfssl
Wolfssl wolfssl
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

28 Aug 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Un servidor TLS1.2 malicioso puede obligar a un cliente TLS1.3 con capacidad de degradación a utilizar un conjunto de cifrado con el que no estuvo de acuerdo y lograr una conexión exitosa. Esto se debe a que, aparte de las extensiones, el cliente se saltaba por completo el análisis del saludo del servidor. https://doi.org/10.46586/tches.v2024.i1.457-500

27 Aug 2024, 20:35

Type Values Removed Values Added
CWE CWE-284

27 Aug 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-27 19:15

Updated : 2025-12-06 00:54


NVD link : CVE-2024-5814

Mitre link : CVE-2024-5814

CVE.ORG link : CVE-2024-5814


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-284

Improper Access Control