CVE-2026-2645

In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This issue affects wolfSSL before 5.8.4 (wolfSSL 5.8.2 and earlier is vulnerable, 5.8.4 is not vulnerable). In 5.8.4 wolfSSL would detect the issue later in the handshake. 5.9.0 was further hardened to catch the issue earlier in the handshake.
CVSS

No CVSS.

Configurations

No configuration.

History

19 Mar 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 18:16

Updated : 2026-03-20 13:39


NVD link : CVE-2026-2645

Mitre link : CVE-2026-2645

CVE.ORG link : CVE-2026-2645


JSON object : View

Products Affected

No product.

CWE
CWE-358

Improperly Implemented Security Check for Standard