CVE-2026-2646
Severity CVSS v4.0:
MEDIUM
Type:
CWE-122
Heap-based Buffer Overflow
Publication date:
19/03/2026
Last modified:
29/04/2026
Description
A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable.
Impact
Base Score 4.0
5.00
Severity 4.0
MEDIUM
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | 5.9.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



