An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the internal length counter to wrap during parsing. This results in incorrect handling of certificate data. The issue is limited to configurations using the original ASN.1 parsing implementation which is off by default.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/10024 | Issue Tracking Patch |
Configurations
History
29 Apr 2026, 13:54
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| CPE | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| First Time |
Wolfssl
Wolfssl wolfssl |
|
| References | () https://github.com/wolfSSL/wolfssl/pull/10024 - Issue Tracking, Patch |
10 Apr 2026, 04:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 04:17
Updated : 2026-04-29 13:54
NVD link : CVE-2026-5188
Mitre link : CVE-2026-5188
CVE.ORG link : CVE-2026-5188
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
