Integer Overflow or Wraparound Affecting wolfssl/wolfssl package, versions [,5.9.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-WOLFSSLWOLFSSL-15990762
  • published12 Apr 2026
  • disclosed10 Apr 2026
  • creditUnknown

Introduced: 10 Apr 2026

NewCVE-2026-5477  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade wolfssl/wolfssl to version 5.9.1 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound due to an integer overflow in the wc_CmacUpdate function. An attacker can generate forged CMAC tags by exploiting the wraparound of the totalSz variable after processing 4 GiB of data, which causes the function to erroneously skip XOR-chaining and discard the live CBC-MAC chain state. This allows two messages with a common suffix beyond the 4 GiB mark to produce identical CMAC tags, enabling unauthorized message forgery.

CVSS Base Scores

version 4.0
version 3.1