CVE-2022-42905
moderate-risk
Published 2022-11-07
In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)
Do I need to act?
~
6.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (12)
Third Party Advisory
http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffe...
Mailing List
http://seclists.org/fulldisclosure/2023/Jan/11
Release Notes
https://github.com/wolfSSL/wolfssl/releases
Vendor Advisory
https://www.wolfssl.com/docs/security-vulnerabilities/
Third Party Advisory
http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffe...
Mailing List
http://seclists.org/fulldisclosure/2023/Jan/11
Release Notes
https://github.com/wolfSSL/wolfssl/releases
Vendor Advisory
https://www.wolfssl.com/docs/security-vulnerabilities/
45
/ 100
moderate-risk
Severity
31/34 · Critical
Exploitability
9/34 · Low
Exposure
5/34 · Minimal