An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used the guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where digest is all-zeros and the XOR is a no-op). However, totalSz is word32 and wraps to zero after 2^28 block flushes (4 GiB), causing the guard to erroneously discard the live CBC-MAC chain state. Any two messages sharing a common suffix beyond the 4 GiB mark then produce identical CMAC tags, enabling a zero-work prefix-substitution forgery. The fix removes the guard, making the XOR unconditional; the no-op property on the first block is preserved because digest is zero-initialized by wc_InitCmac_ex.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/10102 | Issue Tracking |
Configurations
History
27 Apr 2026, 17:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/wolfSSL/wolfssl/pull/10102 - Issue Tracking | |
| CPE | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Wolfssl
Wolfssl wolfssl |
10 Apr 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 06:16
Updated : 2026-04-27 17:51
NVD link : CVE-2026-5477
Mitre link : CVE-2026-5477
CVE.ORG link : CVE-2026-5477
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-190
Integer Overflow or Wraparound
