Vulnerability Description
A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner function TLSX_KeyShare_ProcessPqcClient_ex() frees a KyberKey object upon encountering an error. The caller then invokes TLSX_KeyShare_FreeAll(), which attempts to call ForceZero() on the already-freed KyberKey, resulting in writes of zero bytes over freed heap memory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | < 5.9.1 |
Related Weaknesses (CWE)
References
- https://github.com/wolfssl/wolfssl/pull/10092Issue TrackingPatch
FAQ
What is CVE-2026-5460?
CVE-2026-5460 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inn...
How severe is CVE-2026-5460?
CVE-2026-5460 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5460?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.