Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15346: CWE-306 Missing Authentication for Critical Function in wolfSSL wolfSSL-py

0
Critical
VulnerabilityCVE-2025-15346cvecve-2025-15346cwe-306cwe-287
Published: Wed Jan 07 2026 (01/07/2026, 23:32:11 UTC)
Source: CVE Database V5
Vendor/Project: wolfSSL
Product: wolfSSL-py

Description

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.  This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.  The issue affects versions up to and including 5.8.2.

AI-Powered Analysis

AILast updated: 01/15/2026, 04:36:40 UTC

Technical Analysis

CVE-2025-15346 is a vulnerability in the wolfSSL-py Python package that improperly enforces client certificate requirements during mutual TLS (mTLS) authentication. Specifically, when the verify_mode is set to CERT_REQUIRED, the expected behavior is to mandate client certificates for authentication. However, due to the omission of the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag, the wolfSSL-py package treats connections without a client certificate as valid, effectively downgrading the verification to CERT_OPTIONAL. This flaw allows an attacker to establish a TLS connection without presenting a client certificate, bypassing the mutual authentication mechanism. The vulnerability affects versions up to and including 5.8.2, with the earliest affected version noted as 5.3.0. The CVSS 4.0 base score is 9.3, reflecting a critical severity level due to the vulnerability's network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. The vulnerability does not affect availability but compromises the core security premise of mTLS by allowing unauthorized clients to connect. No public exploits are known at this time, but the flaw presents a significant risk to any system relying on wolfSSL-py for secure client authentication. The root cause lies in missing authentication enforcement flags in the TLS handshake process, a critical oversight in the library's implementation of certificate verification.

Potential Impact

The primary impact of CVE-2025-15346 is the bypass of mutual TLS client authentication, which undermines the confidentiality and integrity of communications protected by wolfSSL-py. For European organizations, this vulnerability could lead to unauthorized access to sensitive systems and data, especially in sectors where mTLS is used to secure API endpoints, IoT devices, industrial control systems, and internal services. Attackers exploiting this flaw can impersonate legitimate clients without possessing valid certificates, potentially leading to data breaches, unauthorized command execution, or lateral movement within networks. The absence of authentication enforcement increases the risk of man-in-the-middle attacks and unauthorized data interception. Given the critical nature of mTLS in securing communications, the vulnerability could disrupt trust models and compliance with data protection regulations such as GDPR. Organizations relying on wolfSSL-py in critical infrastructure, financial services, healthcare, and government systems are particularly vulnerable. The lack of known exploits suggests the window for proactive mitigation remains open, but the high severity score demands urgent attention.

Mitigation Recommendations

To mitigate CVE-2025-15346, organizations should: 1) Immediately audit their use of wolfSSL-py to identify affected versions (up to 5.8.2). 2) Apply patches or upgrade to a fixed version once released by wolfSSL; monitor vendor advisories closely. 3) As an interim measure, implement additional application-layer checks to enforce client certificate presence and validity beyond wolfSSL-py's built-in verification. 4) Configure TLS settings to explicitly include the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag or equivalent to ensure strict client certificate enforcement. 5) Employ network-level controls such as mutual TLS termination proxies that enforce client authentication independently. 6) Conduct penetration testing and validation of mTLS configurations to confirm that client certificates are mandatory and properly verified. 7) Monitor logs for unexpected connections lacking client certificates and investigate anomalies. 8) Educate developers and security teams about the importance of correct TLS flag usage and secure library configurations. These steps go beyond generic TLS hardening by focusing on wolfSSL-py specific configuration and compensating controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wolfSSL
Date Reserved
2025-12-29T23:24:20.378Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695eeee107b8a419a7712f30

Added to database: 1/7/2026, 11:40:17 PM

Last enriched: 1/15/2026, 4:36:40 AM

Last updated: 2/6/2026, 4:40:52 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats