CVE-2026-5188

An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the internal length counter to wrap during parsing. This results in incorrect handling of certificate data. The issue is limited to configurations using the original ASN.1 parsing implementation which is off by default.
References
Link Resource
https://github.com/wolfSSL/wolfssl/pull/10024 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

29 Apr 2026, 13:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
First Time Wolfssl
Wolfssl wolfssl
References () https://github.com/wolfSSL/wolfssl/pull/10024 - () https://github.com/wolfSSL/wolfssl/pull/10024 - Issue Tracking, Patch

10 Apr 2026, 04:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 04:17

Updated : 2026-04-29 13:54


NVD link : CVE-2026-5188

Mitre link : CVE-2026-5188

CVE.ORG link : CVE-2026-5188


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)