CVE-2026-3230
EUVD-2026-1320919.03.2026, 21:17
Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| wolfssl | wolfssl | 𝑥 < 5.9.0 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration