Vulnerability Description
Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | < 5.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/wolfSSL/wolfssl/pull/9817Issue TrackingPatch
FAQ
What is CVE-2026-3549?
CVE-2026-3549 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. ...
How severe is CVE-2026-3549?
CVE-2026-3549 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-3549?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.