CVE-2026-5264

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.
References
Link Resource
https://github.com/wolfssl/wolfssl/pull/10076 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

29 Apr 2026, 17:18

Type Values Removed Values Added
First Time Wolfssl
Wolfssl wolfssl
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/wolfssl/wolfssl/pull/10076 - () https://github.com/wolfssl/wolfssl/pull/10076 - Issue Tracking, Patch

09 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 22:16

Updated : 2026-04-29 17:18


NVD link : CVE-2026-5264

Mitre link : CVE-2026-5264

CVE.ORG link : CVE-2026-5264


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-122

Heap-based Buffer Overflow