A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9748 | Issue Tracking Patch |
| https://github.com/wolfSSL/wolfssl/pull/9949 | Issue Tracking Patch |
Configurations
History
29 Apr 2026, 18:42
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CWE | CWE-787 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| First Time |
Wolfssl
Wolfssl wolfssl |
|
| CPE | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| References | () https://github.com/wolfSSL/wolfssl/pull/9748 - Issue Tracking, Patch | |
| References | () https://github.com/wolfSSL/wolfssl/pull/9949 - Issue Tracking, Patch |
19 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 18:16
Updated : 2026-04-29 18:42
NVD link : CVE-2026-2646
Mitre link : CVE-2026-2646
CVE.ORG link : CVE-2026-2646
JSON object : View
Products Affected
wolfssl
- wolfssl
