CVE-2026-3229: CWE-122 Heap-based buffer overflow in wofSSL wolfSSL
An integer overflow vulnerability existed in the static function wolfssl_add_to_chain, that caused heap corruption when certificate data was written out of bounds of an insufficiently sized certificate buffer. wolfssl_add_to_chain is called by these API: wolfSSL_CTX_add_extra_chain_cert, wolfSSL_CTX_add1_chain_cert, wolfSSL_add0_chain_cert. These API are enabled for 3rd party compatibility features: enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, enable-haproxy. This issue is not remotely exploitable, and would require that the application context loading certificates is compromised.
AI Analysis
Technical Summary
CVE-2026-3229 identifies a heap-based buffer overflow vulnerability in the wolfSSL cryptographic library, specifically within the static function wolfssl_add_to_chain. The root cause is an integer overflow that results in an insufficiently sized buffer for certificate data, causing out-of-bounds writes and subsequent heap corruption. This function is called by APIs such as wolfSSL_CTX_add_extra_chain_cert, wolfSSL_CTX_add1_chain_cert, and wolfSSL_add0_chain_cert, which are only enabled when third-party compatibility features like enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, or enable-haproxy are active. The vulnerability is not remotely exploitable, requiring that the application context loading certificates is already compromised or under attacker control. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), partial attack type (AT:P), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability. No known public exploits exist, and no patches have been officially released at the time of publication. This vulnerability falls under CWE-122 (Heap-based Buffer Overflow), a common and dangerous class of memory corruption bugs that can lead to application crashes or potential code execution if exploited under certain conditions.
Potential Impact
The primary impact of this vulnerability is heap corruption due to buffer overflow when processing certificate chains in wolfSSL. While the vulnerability is not remotely exploitable and requires local compromise of the application context, successful exploitation could lead to application instability, crashes, or potentially arbitrary code execution in the context of the affected process. This could undermine the security of applications relying on wolfSSL for TLS/SSL operations, especially those using third-party compatibility features that enable the vulnerable APIs. The limited attack vector and complexity reduce the likelihood of widespread exploitation, but organizations with sensitive environments or high-assurance requirements could face risks if attackers gain local access. Additionally, corrupted certificate handling could disrupt secure communications or cause denial of service in critical systems. The absence of known exploits and the low CVSS score suggest a low immediate threat, but the vulnerability should be addressed to prevent future exploitation.
Mitigation Recommendations
Organizations should audit their use of wolfSSL, particularly verifying whether third-party compatibility features (enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, enable-haproxy) are enabled, as these activate the vulnerable APIs. If these features are not required, disabling them can reduce exposure. For applications that must use these features, ensure strict access controls and integrity protections around certificate loading contexts to prevent local compromise. Monitor and restrict local access to systems running wolfSSL to trusted administrators only. Implement runtime protections such as heap integrity checks, address space layout randomization (ASLR), and control flow integrity (CFI) to mitigate exploitation impact. Stay alert for official patches or updates from wolfSSL and apply them promptly once available. Additionally, conduct thorough testing of certificate handling workflows to detect anomalies or crashes that might indicate exploitation attempts. Consider using alternative TLS libraries if timely patches are unavailable and risk is unacceptable.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, China, India, Canada, Australia
CVE-2026-3229: CWE-122 Heap-based buffer overflow in wofSSL wolfSSL
Description
An integer overflow vulnerability existed in the static function wolfssl_add_to_chain, that caused heap corruption when certificate data was written out of bounds of an insufficiently sized certificate buffer. wolfssl_add_to_chain is called by these API: wolfSSL_CTX_add_extra_chain_cert, wolfSSL_CTX_add1_chain_cert, wolfSSL_add0_chain_cert. These API are enabled for 3rd party compatibility features: enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, enable-haproxy. This issue is not remotely exploitable, and would require that the application context loading certificates is compromised.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3229 identifies a heap-based buffer overflow vulnerability in the wolfSSL cryptographic library, specifically within the static function wolfssl_add_to_chain. The root cause is an integer overflow that results in an insufficiently sized buffer for certificate data, causing out-of-bounds writes and subsequent heap corruption. This function is called by APIs such as wolfSSL_CTX_add_extra_chain_cert, wolfSSL_CTX_add1_chain_cert, and wolfSSL_add0_chain_cert, which are only enabled when third-party compatibility features like enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, or enable-haproxy are active. The vulnerability is not remotely exploitable, requiring that the application context loading certificates is already compromised or under attacker control. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), partial attack type (AT:P), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability. No known public exploits exist, and no patches have been officially released at the time of publication. This vulnerability falls under CWE-122 (Heap-based Buffer Overflow), a common and dangerous class of memory corruption bugs that can lead to application crashes or potential code execution if exploited under certain conditions.
Potential Impact
The primary impact of this vulnerability is heap corruption due to buffer overflow when processing certificate chains in wolfSSL. While the vulnerability is not remotely exploitable and requires local compromise of the application context, successful exploitation could lead to application instability, crashes, or potentially arbitrary code execution in the context of the affected process. This could undermine the security of applications relying on wolfSSL for TLS/SSL operations, especially those using third-party compatibility features that enable the vulnerable APIs. The limited attack vector and complexity reduce the likelihood of widespread exploitation, but organizations with sensitive environments or high-assurance requirements could face risks if attackers gain local access. Additionally, corrupted certificate handling could disrupt secure communications or cause denial of service in critical systems. The absence of known exploits and the low CVSS score suggest a low immediate threat, but the vulnerability should be addressed to prevent future exploitation.
Mitigation Recommendations
Organizations should audit their use of wolfSSL, particularly verifying whether third-party compatibility features (enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, enable-haproxy) are enabled, as these activate the vulnerable APIs. If these features are not required, disabling them can reduce exposure. For applications that must use these features, ensure strict access controls and integrity protections around certificate loading contexts to prevent local compromise. Monitor and restrict local access to systems running wolfSSL to trusted administrators only. Implement runtime protections such as heap integrity checks, address space layout randomization (ASLR), and control flow integrity (CFI) to mitigate exploitation impact. Stay alert for official patches or updates from wolfSSL and apply them promptly once available. Additionally, conduct thorough testing of certificate handling workflows to detect anomalies or crashes that might indicate exploitation attempts. Consider using alternative TLS libraries if timely patches are unavailable and risk is unacceptable.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- wolfSSL
- Date Reserved
- 2026-02-25T20:41:05.804Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bc698ee32a4fbe5ffae0a9
Added to database: 3/19/2026, 9:24:30 PM
Last enriched: 3/19/2026, 9:40:16 PM
Last updated: 5/3/2026, 4:38:13 PM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.