2026-03-19 17:45CVE-2026-3548wolfSSL
PUBLISHED5.2CWE-787CWE-122

Buffer overflow in CRL number parsing in wolfSSL

Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, either of these out of bound writes could be triggered. Note this only affects builds that specifically enable CRL support, and the user would need to load a CRL from an untrusted source.

Problem type

Affected products

wolfSSL

wolfSSL

< 5.9.0 - AFFECTED

References

GitHub Security Advisories

GHSA-86fv-q5vx-mw5m

Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a...

https://github.com/advisories/GHSA-86fv-q5vx-mw5m

Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, either of these out of bound writes could be triggered. Note this only affects builds that specifically enable CRL support, and the user would need to load a CRL from an untrusted source.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-3548
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-3548",
    "assignerOrgId": "50d2cd11-d01a-48ed-9441-5bfce9d63b27",
    "assignerShortName": "wolfSSL",
    "dateUpdated": "2026-03-19T18:00:53.844Z",
    "dateReserved": "2026-03-04T18:42:04.494Z",
    "datePublished": "2026-03-19T17:45:16.717Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "50d2cd11-d01a-48ed-9441-5bfce9d63b27",
        "shortName": "wolfSSL",
        "dateUpdated": "2026-03-19T17:45:16.717Z"
      },
      "title": "Buffer overflow in CRL number parsing in wolfSSL",
      "descriptions": [
        {
          "lang": "en",
          "value": "Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, either of these out of bound writes could be triggered. Note this only affects builds that specifically enable CRL support, and the user would need to load a CRL from an untrusted source.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, either of these out of bound writes could be triggered. Note this only affects builds that specifically enable CRL support, and the user would need to load a CRL from an untrusted source.</p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "wolfSSL",
          "product": "wolfSSL",
          "collectionURL": "https://www.wolfssl.com/download/",
          "packageName": "wolfSSL",
          "modules": [
            "wolfSSL"
          ],
          "programFiles": [
            "wolfcrypt/src/asn.c"
          ],
          "programRoutines": [
            {
              "name": "ParseCRL()"
            },
            {
              "name": "ParseCRL_Extensions()"
            }
          ],
          "platforms": [
            "MacOS",
            "Linux",
            "Windows"
          ],
          "repo": "https://github.com/wolfSSL/wolfssl",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "5.9.0"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-787 Out-of-bounds Write",
              "cweId": "CWE-787",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-122 Heap-based Buffer Overflow",
              "cweId": "CWE-122",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://github.com/wolfSSL/wolfssl/pull/9628/"
        },
        {
          "url": "https://github.com/wolfSSL/wolfssl/pull/9873/"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "Disabling CRL processing is the only effective workaround for this issue. Preventing the overflow by validating the CRL number length requires source code modification and therefore should be considered a fix rather than a workaround.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Disabling CRL processing is the only effective workaround for this issue. Preventing the overflow by validating the CRL number length requires source code modification and therefore should be considered a fix rather than a workaround."
            }
          ]
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2026-03-19T18:00:53.844Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}