Lucene search

K
cvelistWolfSSLCVELIST:CVE-2024-5814
HistoryAug 27, 2024 - 6:38 p.m.

CVE-2024-5814 Unverifed Ciphersuite used on a client-side TLS1.3 Downgrade

2024-08-2718:38:08
wolfSSL
www.cve.org
3
cve-2024-5814
ciphersuite
tls1.3
downgrade
malicious server

CVSS4

5.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

ACTIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N/AU:Y/U:Green/V:D/RE:M

EPSS

0

Percentile

9.5%

A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "wolfSSL",
    "programFiles": [
      "src/tls13.c"
    ],
    "repo": "https://github.com/wolfSSL/wolfssl",
    "vendor": "wolfSSL",
    "versions": [
      {
        "lessThanOrEqual": "5.7.0",
        "status": "affected",
        "version": "0",
        "versionType": "Release"
      }
    ]
  }
]

CVSS4

5.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

ACTIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N/AU:Y/U:Green/V:D/RE:M

EPSS

0

Percentile

9.5%