Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9754 | Patch Issue Tracking |
Configurations
History
No history.
Information
Published : 2026-03-19 21:17
Updated : 2026-03-26 18:33
NVD link : CVE-2026-3230
Mitre link : CVE-2026-3230
CVE.ORG link : CVE-2026-3230
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-20
Improper Input Validation
