Products
wolfSSL
Source
facts@wolfssl.com
Tags
CVE-2024-5814 details
Published : Aug. 27, 2024, 7:15 p.m.
Last Modified : Aug. 27, 2024, 8:35 p.m.
Last Modified : Aug. 27, 2024, 8:35 p.m.
Description
A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-284 | Improper Access Control | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
References
URL | Source |
---|---|
https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#add_later | facts@wolfssl.com |
This website uses the NVD API, but is not approved or certified by it.