CVE-2026-5448

X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when calling these two APIs directly from an application, and does not affect TLS or certificate verify operations in wolfSSL.
References
Link Resource
https://github.com/wolfSSL/wolfssl/pull/10071 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

29 Apr 2026, 13:56

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl/pull/10071 - () https://github.com/wolfSSL/wolfssl/pull/10071 - Issue Tracking, Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
First Time Wolfssl
Wolfssl wolfssl

10 Apr 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 00:16

Updated : 2026-04-29 13:56


NVD link : CVE-2026-5448

Mitre link : CVE-2026-5448

CVE.ORG link : CVE-2026-5448


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-122

Heap-based Buffer Overflow