← Back to CVEs
CVE-2026-3230
LOW2.7
Description
Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes.
CVE Details
CVSS v3.1 Score2.7
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published3/19/2026
Last Modified3/26/2026
Sourcenvd
Honeypot Sightings0
Affected Products
wolfssl:wolfssl
Weaknesses (CWE)
CWE-20
References
https://github.com/wolfSSL/wolfssl/pull/9754(facts@wolfssl.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.