🔐 CVE Alert

CVE-2026-5500

UNKNOWN 0.0

Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
33th

wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to 1 byte, reducing the tag check from 2⁻¹²⁸ to 2⁻⁸.

CWE CWE-20
Vendor wolfssl
Product wolfssl
Published Apr 10, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for wolfssl wolfssl

Be the first to know when new unknown vulnerabilities affecting wolfssl wolfssl are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

wolfSSL / wolfSSL
0 ≤ 5.9.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/wolfSSL/wolfssl/pull/10102

Credits

Calif.io in collaboration with Claude and Anthropic Research