CVE-2025-11934

Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

03 Dec 2025, 18:47

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl - () https://github.com/wolfSSL/wolfssl - Product
References () https://github.com/wolfSSL/wolfssl/pull/9113 - () https://github.com/wolfSSL/wolfssl/pull/9113 - Issue Tracking, Patch
First Time Apple macos
Wolfssl
Linux linux Kernel
Linux
Wolfssl wolfssl
Apple
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 2.7
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

24 Nov 2025, 18:15

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl/pull/9113 - () https://github.com/wolfSSL/wolfssl/pull/9113 -

21 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-21 23:15

Updated : 2025-12-03 18:47


NVD link : CVE-2025-11934

Mitre link : CVE-2025-11934

CVE.ORG link : CVE-2025-11934


JSON object : View

Products Affected

wolfssl

  • wolfssl

apple

  • macos

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation