Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-25640

Опубликовано: 24 фев. 2022
Источник: debian
EPSS Низкий

Описание

In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement for mutual authentication. A client can simply omit the certificate_verify message from the handshake, and never present a certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslfixed5.2.0-1package
wolfsslfixed4.6.0+p1-0+deb11u1bullseyepackage

Примечания

  • https://github.com/wolfSSL/wolfssl/pull/4831

  • https://github.com/wolfSSL/wolfssl/commit/3cdb1c639da94a9dc8c75590d0ec475e7f27c226 (v5.2.0-stable)

  • https://github.com/wolfSSL/wolfssl/commit/b60d2dccce9110fd2b985d99063e524e39bdf6f7 (v5.2.0-stable)

EPSS

Процентиль: 90%
0.05102
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 4 года назад

In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement for mutual authentication. A client can simply omit the certificate_verify message from the handshake, and never present a certificate.

CVSS3: 7.5
nvd
почти 4 года назад

In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement for mutual authentication. A client can simply omit the certificate_verify message from the handshake, and never present a certificate.

CVSS3: 7.5
github
почти 4 года назад

In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement for mutual authentication. A client can simply omit the certificate_verify message from the handshake, and never present a certificate.

EPSS

Процентиль: 90%
0.05102
Низкий