Vulnerability Description
Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | >= 5.8.2, < 5.8.4 |
| Apple | Macos | - |
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- https://github.com/wolfSSL/wolfsslProduct
- https://github.com/wolfSSL/wolfssl/pull/9132Issue TrackingPatch
FAQ
What is CVE-2025-11933?
CVE-2025-11933 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via ...
How severe is CVE-2025-11933?
CVE-2025-11933 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11933?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl, Apple Macos, Linux Linux Kernel.