CVE-2023-6937 Vulnerability Details

  /     /     /  

CVE-2023-6937 Metadata Quick Info

CVE Published: 15/02/2024 | CVE Updated: 02/08/2024 | CVE Year: 2023
Source: wolfSSL | Vendor: wolfSSL | Product: wolfSSL
Status : PUBLISHED

CVE-2023-6937 Description

wolfSSL prior to 5.6.6 did not check that messages in one (D)TLS record do not span key boundaries. As a result, it was possible to combine (D)TLS messages using different keys into one (D)TLS record. The most extreme edge case is that, in (D)TLS 1.3, it was possible that an unencrypted (D)TLS 1.3 record from the server containing first a ServerHello message and then the rest of the first server flight would be accepted by a wolfSSL client. In (D)TLS 1.3 the handshake is encrypted after the ServerHello but a wolfSSL client would accept an unencrypted flight from the server. This does not compromise key negotiation and authentication so it is assigned a low severity rating.

Metrics

CVSS Version: 3.1 | Base Score: 5.3 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* NONE
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* LOW
    Integrity Impact (I)* NONE
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-20
CWE Name: CWE-20 Improper Input Validation
Source: wolfSSL

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-272
CAPEC Description: CAPEC-272 Protocol Manipulation


Source: NVD (National Vulnerability Database).