CVE-2025-11935

With TLS 1.3 pre-shared key (PSK) a malicious or faulty server could ignore the request for PFS (perfect forward secrecy) and the client would continue on with the connection using PSK without PFS. This happened when a server responded to a ClientHello containing psk_dhe_ke without a key_share extension. The re-use of an authenticated PSK connection that on the clients side unexpectedly did not have PFS, reduces the security of the connection.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

03 Dec 2025, 18:47

Type Values Removed Values Added
First Time Apple macos
Wolfssl
Linux linux Kernel
Linux
Wolfssl wolfssl
Apple
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/wolfSSL/wolfssl - () https://github.com/wolfSSL/wolfssl - Product
References () https://github.com/wolfSSL/wolfssl/pull/9112 - () https://github.com/wolfSSL/wolfssl/pull/9112 - Issue Tracking, Patch

21 Nov 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-21 22:16

Updated : 2025-12-03 18:47


NVD link : CVE-2025-11935

Mitre link : CVE-2025-11935

CVE.ORG link : CVE-2025-11935


JSON object : View

Products Affected

wolfssl

  • wolfssl

apple

  • macos

linux

  • linux_kernel
CWE
CWE-326

Inadequate Encryption Strength