Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3849: CWE-787: Out-of-bounds Write in wolfSSL Inc. wolfSSL

0
Medium
VulnerabilityCVE-2026-3849cvecve-2026-3849cwe-787
Published: Thu Mar 19 2026 (03/19/2026, 20:29:30 UTC)
Source: CVE Database V5
Vendor/Project: wolfSSL Inc.
Product: wolfSSL

Description

Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote execution and client program crash. This could be exploited by a malicious TLS server supporting ECH. Note that ECH is off by default, and is only enabled with enable-ech.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:52:01 UTC

Technical Analysis

CVE-2026-3849 is a stack buffer overflow vulnerability classified under CWE-787 found in wolfSSL version 5.6.0-stable, specifically in the wc_HpkeLabeledExtract function that processes Encrypted Client Hello (ECH) configurations. ECH is a TLS extension designed to encrypt the ClientHello message to improve privacy. The vulnerability arises when a malicious TLS server sends an oversized ECH configuration, which is not properly bounds-checked, leading to a stack buffer overflow on the client side. This overflow can corrupt the stack, potentially allowing an attacker to execute arbitrary code remotely or cause a denial-of-service via client crashes. The vulnerability does not require any authentication or user interaction and can be triggered simply by establishing a TLS connection with a malicious server that supports ECH. Since ECH is off by default and must be enabled explicitly with the enable-ech option, only clients with this feature enabled are vulnerable. The CVSS 4.0 base score is 6.9, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability. No patches have been linked yet, and no known exploits are reported in the wild. The vulnerability highlights the risks of implementing new TLS extensions without thorough input validation and bounds checking.

Potential Impact

The vulnerability could allow malicious TLS servers to compromise client systems running vulnerable wolfSSL versions with ECH enabled. Successful exploitation may lead to remote code execution, allowing attackers to execute arbitrary code in the context of the client application, potentially leading to full system compromise. Even if code execution is not achieved, the overflow can cause client crashes, resulting in denial-of-service conditions. This impacts confidentiality by potentially exposing sensitive client data, integrity by allowing unauthorized code execution, and availability by causing application failures. Organizations relying on wolfSSL for secure communications, especially those enabling ECH for privacy enhancements, face risks of targeted attacks from malicious or compromised TLS servers. This is particularly concerning for embedded devices, IoT, and security appliances using wolfSSL. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as ECH adoption grows.

Mitigation Recommendations

Organizations should immediately audit their use of wolfSSL to determine if ECH is enabled. If ECH is enabled, disable it until a patched version is available. Monitor wolfSSL vendor advisories for patches addressing CVE-2026-3849 and apply updates promptly once released. Implement network-level controls to restrict connections to trusted TLS servers where feasible. Employ runtime protections such as stack canaries and address space layout randomization (ASLR) to mitigate exploitation impact. Conduct thorough testing of wolfSSL integrations with ECH enabled in controlled environments to detect abnormal behavior. For embedded and IoT devices, ensure firmware updates can be deployed quickly to remediate this vulnerability. Additionally, consider using alternative TLS libraries without this vulnerability if immediate patching is not possible. Maintain vigilant monitoring for suspicious TLS handshake anomalies that could indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
wolfSSL
Date Reserved
2026-03-09T19:50:50.081Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bca5a4e32a4fbe5f143384

Added to database: 3/20/2026, 1:40:52 AM

Last enriched: 3/27/2026, 6:52:01 PM

Last updated: 5/4/2026, 4:04:02 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses