CVE-2026-3549

Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving.
References
Link Resource
https://github.com/wolfSSL/wolfssl/pull/9817 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-19 21:17

Updated : 2026-03-26 18:21


NVD link : CVE-2026-3549

Mitre link : CVE-2026-3549

CVE.ORG link : CVE-2026-3549


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-122

Heap-based Buffer Overflow