In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This issue affects wolfSSL before 5.8.4 (wolfSSL 5.8.2 and earlier is vulnerable, 5.8.4 is not vulnerable). In 5.8.4 wolfSSL would detect the issue later in the handshake. 5.9.0 was further hardened to catch the issue earlier in the handshake.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9694 |
Configurations
No configuration.
History
19 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 18:16
Updated : 2026-03-20 13:39
NVD link : CVE-2026-2645
Mitre link : CVE-2026-2645
CVE.ORG link : CVE-2026-2645
JSON object : View
Products Affected
No product.
CWE
CWE-358
Improperly Implemented Security Check for Standard
