CVE-2022-39173
moderate-risk
Published 2022-09-29
In wolfSSL before 5.5.1, malicious clients can cause a buffer overflow during a TLS 1.3 handshake. This occurs when an attacker supposedly resumes a previous TLS session. During the resumption Client Hello a Hello Retry Request must be triggered. Both Client Hellos are required to contain a list of duplicate cipher suites to trigger the buffer overflow. In total, two Client Hellos have to be sent: one in the resumed session, and a second one as a response to a Hello Retry Request message.
Do I need to act?
~
1.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Mailing List
http://seclists.org/fulldisclosure/2022/Oct/24
Release Notes
https://github.com/wolfSSL/wolfssl/releases
Vendor Advisory
https://www.wolfssl.com/docs/security-vulnerabilities/
Mailing List
http://seclists.org/fulldisclosure/2022/Oct/24
Release Notes
https://github.com/wolfSSL/wolfssl/releases
Vendor Advisory
https://www.wolfssl.com/docs/security-vulnerabilities/
35
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
4/34 · Minimal
Exposure
5/34 · Minimal