๐Ÿ” CVE Alert

CVE-2026-3547

HIGH 7.5

wolfSSL: out-of-bounds read (DoS) in ALPN parsing due to incomplete validation

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
11th

Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic.

CWE CWE-125
Vendor wolfssl
Product wolfssl
Published Mar 19, 2026
Last Updated Mar 21, 2026
Stay Ahead of the Next One

Get instant alerts for wolfssl wolfssl

Be the first to know when new high vulnerabilities affecting wolfssl wolfssl are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

wolfSSL / wolfSSL
0 < 5.9.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/wolfSSL/wolfssl/pull/9859

Credits

Oleh Konko