🔐 CVE Alert

CVE-2026-5477

UNKNOWN 0.0

Prefix-substitution forgery via integer overflow in wolfCrypt CMAC

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
13th

An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used the guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where digest is all-zeros and the XOR is a no-op). However, totalSz is word32 and wraps to zero after 2^28 block flushes (4 GiB), causing the guard to erroneously discard the live CBC-MAC chain state. Any two messages sharing a common suffix beyond the 4 GiB mark then produce identical CMAC tags, enabling a zero-work prefix-substitution forgery. The fix removes the guard, making the XOR unconditional; the no-op property on the first block is preserved because digest is zero-initialized by wc_InitCmac_ex.

CWE CWE-190
Vendor wolfssl
Product wolfssl
Published Apr 10, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for wolfssl wolfssl

Be the first to know when new unknown vulnerabilities affecting wolfssl wolfssl are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

wolfSSL / wolfSSL
0 ≤ 5.9.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/wolfSSL/wolfssl/pull/10102

Credits

Calif.io in collaboration with Claude and Anthropic Research