CVE-2025-11936

Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry values for the same supported group, leading to excessive CPU and memory consumption during ClientHello processing.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

03 Dec 2025, 18:47

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl - () https://github.com/wolfSSL/wolfssl - Product
References () https://github.com/wolfSSL/wolfssl/pull/9117 - () https://github.com/wolfSSL/wolfssl/pull/9117 - Issue Tracking, Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
First Time Wolfssl
Wolfssl wolfssl

24 Nov 2025, 18:15

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl/pull/9117 - () https://github.com/wolfSSL/wolfssl/pull/9117 -

21 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-21 23:15

Updated : 2025-12-03 18:47


NVD link : CVE-2025-11936

Mitre link : CVE-2025-11936

CVE.ORG link : CVE-2025-11936


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-20

Improper Input Validation