A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable.
CVSS
No CVSS.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-19 18:16
Updated : 2026-03-20 13:39
NVD link : CVE-2026-2646
Mitre link : CVE-2026-2646
CVE.ORG link : CVE-2026-2646
JSON object : View
Products Affected
No product.
CWE
CWE-122
Heap-based Buffer Overflow
