๐Ÿ” CVE Alert

CVE-2026-5448

UNKNOWN 0.0

1-2 Byte Buffer Overflow in wolfSSL_X509_notAfter/notBefore

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
3th

X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when calling these two APIs directly from an application, and does not affect TLS or certificate verify operations in wolfSSL.

CWE CWE-122
Vendor wolfssl
Product wolfssl
Published Apr 9, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for wolfssl wolfssl

Be the first to know when new unknown vulnerabilities affecting wolfssl wolfssl are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

wolfSSL / wolfSSL
0 < 5.9.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/wolfSSL/wolfssl/pull/10071

Credits

Sunwoo Lee, Korea Institute of Energy Technology (KENTECH) Seunghyun Yoon, Korea Institute of Energy Technology (KENTECH)