Out-of-bounds Read Affecting wolfssl package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CONAN-WOLFSSL-15762323
  • published24 Mar 2026
  • disclosed19 Mar 2026
  • creditOleh Konko

Introduced: 19 Mar 2026

NewCVE-2026-3547  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read in the ALPN parsing process due to incomplete validation. An attacker can cause a process crash by sending a specially crafted ALPN protocol list that triggers an out-of-bounds read. This is only exploitable if the library is built with ALPN support enabled.

Workaround

This vulnerability can be mitigated by building without ALPN support if ALPN is not required.

CVSS Base Scores

version 4.0
version 3.1