Intel

AIKIDO-2026-10486

wolfSSL.wolfssl is vulnerable to Heap-based Buffer Overflow

Heap-based Buffer OverflowCVE-2026-5264

83

High Risk

This Affects:

c++wolfSSL.wolfssl
0.0.1 - 5.9.0
Fixed in 5.9.1

TL;DR

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

wolfSSL.wolfssl is vulnerable to Heap-based Buffer Overflow in versions 0.0.1 - 5.9.0.

How to fix this

Upgrade the wolfSSL.wolfssl library to the patch version.