Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/10131 | Issue Tracking |
Configurations
History
16 Apr 2026, 20:37
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| CPE | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| References | () https://github.com/wolfSSL/wolfssl/pull/10131 - Issue Tracking | |
| First Time |
Wolfssl
Wolfssl wolfssl |
09 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 20:16
Updated : 2026-04-16 20:37
NVD link : CVE-2026-5194
Mitre link : CVE-2026-5194
CVE.ORG link : CVE-2026-5194
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-295
Improper Certificate Validation
