Vulnerability Description
Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large value that is passed to AEAD decryption routines, causing heap buffer overflow and a crash. An unauthenticated attacker can trigger this remotely via malformed TLS Application Data records.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | <= 5.8.4 |
Related Weaknesses (CWE)
References
- https://github.com/wolfSSL/wolfssl/pull/9571Issue TrackingPatch
FAQ
What is CVE-2026-1005?
CVE-2026-1005 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authenticatio...
How severe is CVE-2026-1005?
CVE-2026-1005 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1005?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.