With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9395 | Issue Tracking Patch |
Configurations
History
04 Dec 2025, 15:43
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/wolfSSL/wolfssl/pull/9395 - Issue Tracking, Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| CPE | cpe:2.3:a:wolfssl:wolfssl:5.8.4:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Wolfssl
Wolfssl wolfssl |
22 Nov 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-22 00:15
Updated : 2025-12-04 15:43
NVD link : CVE-2025-12889
Mitre link : CVE-2025-12889
CVE.ORG link : CVE-2025-12889
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
