Vulnerability Description
Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large value that is passed to AEAD decryption routines, causing a large out-of-bounds read and crash. An unauthenticated attacker can trigger this remotely via malformed TLS Application Data records.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | < 5.9.1 |
Related Weaknesses (CWE)
References
- https://github.com/wolfSSL/wolfssl/pull/10125Issue TrackingPatch
FAQ
What is CVE-2026-5778?
CVE-2026-5778 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication ...
How severe is CVE-2026-5778?
CVE-2026-5778 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5778?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.