Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, either of these out of bound writes could be triggered. Note this only affects builds that specifically enable CRL support, and the user would need to load a CRL from an untrusted source.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9628/ | Issue Tracking Patch |
| https://github.com/wolfSSL/wolfssl/pull/9873/ | Exploit Issue Tracking Patch |
Configurations
History
29 Apr 2026, 18:41
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| References | () https://github.com/wolfSSL/wolfssl/pull/9628/ - Issue Tracking, Patch | |
| References | () https://github.com/wolfSSL/wolfssl/pull/9873/ - Exploit, Issue Tracking, Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Wolfssl
Wolfssl wolfssl |
19 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 18:16
Updated : 2026-04-29 18:41
NVD link : CVE-2026-3548
Mitre link : CVE-2026-3548
CVE.ORG link : CVE-2026-3548
JSON object : View
Products Affected
wolfssl
- wolfssl
