Логотип exploitDog
bind:CVE-2025-15346
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-15346

Количество 2

Количество 2

nvd логотип

CVE-2025-15346

около 1 месяца назад

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.  This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.  The issue affects versions up to and including 5.8.2.

EPSS: Низкий
github логотип

GHSA-vj87-jj27-4h9c

около 1 месяца назад

wolfSSL Python module vulnerable to Improper Authentication

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-15346

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.  This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.  The issue affects versions up to and including 5.8.2.

0%
Низкий
около 1 месяца назад
github логотип
GHSA-vj87-jj27-4h9c

wolfSSL Python module vulnerable to Improper Authentication

0%
Низкий
около 1 месяца назад

Уязвимостей на страницу