Vulnerability Description
A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | <= 5.7.0 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-5814?
CVE-2024-5814 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensi...
How severe is CVE-2024-5814?
CVE-2024-5814 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5814?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.