Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9817 |
|
History
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
Thu, 19 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving. | |
| Title | ECH parsing heap buffer overflow | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published: 2026-03-19T20:09:27.036Z
Updated: 2026-03-19T20:09:27.036Z
Reserved: 2026-03-04T18:44:13.820Z
Link: CVE-2026-3549
No data.
Status : Awaiting Analysis
Published: 2026-03-19T21:17:12.823
Modified: 2026-03-20T13:39:46.493
Link: CVE-2026-3549
No data.
ReportizFlow