wolfssl is vulnerable to Replay Attacks
56
Medium Risk
Affected versions of this package are affected by improper handling of Online Certificate Status Protocol (OCSP) requests for intermediate certificates in a TLS 1.3 connection, particularly when OCSP stapling is not enabled. It could lead to a bypass when validating these intermediate certificates. As a result, this oversight may expose the connection to potential security risks, such as replay attacks.
You are affected if you are using a version that falls within the vulnerable range.
wolfssl is vulnerable to Replay Attacks in versions 3.7.0 - 5.7.4.
Upgrade the wolfssl library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant