Intel

AIKIDO-2025-10001

wolfssl is vulnerable to Replay Attacks

Replay Attacks Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

56

Medium Risk

This Affects:

c++wolfssl
3.7.0 - 5.7.4
Fixed in 5.7.6

TL;DR

Affected versions of this package are affected by improper handling of Online Certificate Status Protocol (OCSP) requests for intermediate certificates in a TLS 1.3 connection, particularly when OCSP stapling is not enabled. It could lead to a bypass when validating these intermediate certificates. As a result, this oversight may expose the connection to potential security risks, such as replay attacks.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

wolfssl is vulnerable to Replay Attacks in versions 3.7.0 - 5.7.4.

How to fix this

Upgrade the wolfssl library to the patch version.