CVE-2026-2646

A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable.
CVSS

No CVSS.

Configurations

No configuration.

History

No history.

Information

Published : 2026-03-19 18:16

Updated : 2026-03-20 13:39


NVD link : CVE-2026-2646

Mitre link : CVE-2026-2646

CVE.ORG link : CVE-2026-2646


JSON object : View

Products Affected

No product.

CWE
CWE-122

Heap-based Buffer Overflow