CVE-2024-5814

Name
CVE-2024-5814
Description
A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#add_later

Match rules

CPE URI Source package Min version Max version
wolfssl >= 0 <= 5.7.0
cpe:2.3:a:wolfssl:wolfssl:-:*:*:*:*:*:*:* wolfssl >= 0 <= 5.70

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
wolfssl 3.20-community 5.7.2-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
wolfssl edge-community 5.7.4-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable