Vulnerability Description
Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote execution and client program crash. This could be exploited by a malicious TLS server supporting ECH. Note that ECH is off by default, and is only enabled with enable-ech.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | >= 5.6.0, < 5.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/wolfSSL/wolfssl/pull/9737Issue TrackingPatch
FAQ
What is CVE-2026-3849?
CVE-2026-3849 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cau...
How severe is CVE-2026-3849?
CVE-2026-3849 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-3849?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.